Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-31080 (GCVE-0-2024-31080)
Vulnerability from cvelistv5
- CWE-126 - Buffer Over-read
 
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 
                    
                      
                        
                          Version: 29.1.0   ≤  | 
                  ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
                    
  | 
                ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T01:46:04.428Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/04/03/13"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2024/04/12/10"
          },
          {
            "name": "RHSA-2024:1785",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:1785"
          },
          {
            "name": "RHSA-2024:2036",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2036"
          },
          {
            "name": "RHSA-2024:2037",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2037"
          },
          {
            "name": "RHSA-2024:2038",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2038"
          },
          {
            "name": "RHSA-2024:2039",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2039"
          },
          {
            "name": "RHSA-2024:2040",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2040"
          },
          {
            "name": "RHSA-2024:2041",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2041"
          },
          {
            "name": "RHSA-2024:2042",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2042"
          },
          {
            "name": "RHSA-2024:2080",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2080"
          },
          {
            "name": "RHSA-2024:2616",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:2616"
          },
          {
            "name": "RHSA-2024:3258",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3258"
          },
          {
            "name": "RHSA-2024:3261",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3261"
          },
          {
            "name": "RHSA-2024:3343",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/errata/RHSA-2024:3343"
          },
          {
            "tags": [
              "vdb-entry",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
          },
          {
            "name": "RHBZ#2271997",
            "tags": [
              "issue-tracking",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-31080",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-07T15:41:05.539453Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-03T18:18:59.223Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://gitlab.freedesktop.org/xorg/xserver",
          "defaultStatus": "unaffected",
          "packageName": "xorg-server",
          "versions": [
            {
              "lessThan": "*",
              "status": "affected",
              "version": "29.1.0",
              "versionType": "semver"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:rhel_els:6"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 6 Extended Lifecycle Support  - EXTENSION",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.1.0-25.el6_10.13",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7::computenode",
            "cpe:/o:redhat:enterprise_linux:7::client",
            "cpe:/o:redhat:enterprise_linux:7::server",
            "cpe:/o:redhat:enterprise_linux:7::workstation"
          ],
          "defaultStatus": "affected",
          "packageName": "xorg-x11-server",
          "product": "Red Hat Enterprise Linux 7",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.20.4-29.el7_9",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:7::computenode",
            "cpe:/o:redhat:enterprise_linux:7::client",
            "cpe:/o:redhat:enterprise_linux:7::server",
            "cpe:/o:redhat:enterprise_linux:7::workstation"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 7",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.8.0-33.el7_9",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:8::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.13.1-2.el8_9.10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:8::appstream",
            "cpe:/a:redhat:enterprise_linux:8::crb"
          ],
          "defaultStatus": "affected",
          "packageName": "xorg-x11-server",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.20.11-23.el8_10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:8::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.13.1-10.el8_10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:8::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "xorg-x11-server-Xwayland",
          "product": "Red Hat Enterprise Linux 8",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:21.1.3-16.el8_10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_tus:8.2::appstream",
            "cpe:/a:redhat:rhel_e4s:8.2::appstream",
            "cpe:/a:redhat:rhel_aus:8.2::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.9.0-15.el8_2.11",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_tus:8.2::appstream",
            "cpe:/a:redhat:rhel_e4s:8.2::appstream",
            "cpe:/a:redhat:rhel_aus:8.2::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.9.0-15.el8_2.11",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_tus:8.2::appstream",
            "cpe:/a:redhat:rhel_e4s:8.2::appstream",
            "cpe:/a:redhat:rhel_aus:8.2::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.9.0-15.el8_2.11",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_e4s:8.4::appstream",
            "cpe:/a:redhat:rhel_tus:8.4::appstream",
            "cpe:/a:redhat:rhel_aus:8.4::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.11.0-8.el8_4.10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_e4s:8.4::appstream",
            "cpe:/a:redhat:rhel_tus:8.4::appstream",
            "cpe:/a:redhat:rhel_aus:8.4::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.11.0-8.el8_4.10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_e4s:8.4::appstream",
            "cpe:/a:redhat:rhel_tus:8.4::appstream",
            "cpe:/a:redhat:rhel_aus:8.4::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.11.0-8.el8_4.10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_eus:8.6::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.6 Extended Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.12.0-6.el8_6.11",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_eus:8.8::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 8.8 Extended Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.12.0-15.el8_8.10",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:9::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.13.1-8.el9_4.3",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:9::crb",
            "cpe:/a:redhat:enterprise_linux:9::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "xorg-x11-server-Xwayland",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:23.2.7-1.el9",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:enterprise_linux:9::crb",
            "cpe:/a:redhat:enterprise_linux:9::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "xorg-x11-server",
          "product": "Red Hat Enterprise Linux 9",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.20.11-26.el9",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_eus:9.0::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 9.0 Extended Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.11.0-22.el9_0.11",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/a:redhat:rhel_eus:9.2::appstream"
          ],
          "defaultStatus": "affected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 9.2 Extended Update Support",
          "vendor": "Red Hat",
          "versions": [
            {
              "lessThan": "*",
              "status": "unaffected",
              "version": "0:1.12.0-14.el9_2.8",
              "versionType": "rpm"
            }
          ]
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10"
          ],
          "defaultStatus": "unaffected",
          "packageName": "tigervnc",
          "product": "Red Hat Enterprise Linux 10",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10"
          ],
          "defaultStatus": "unaffected",
          "packageName": "xorg-x11-server",
          "product": "Red Hat Enterprise Linux 10",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:10"
          ],
          "defaultStatus": "unaffected",
          "packageName": "xorg-x11-server-Xwayland",
          "product": "Red Hat Enterprise Linux 10",
          "vendor": "Red Hat"
        },
        {
          "collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
          "cpes": [
            "cpe:/o:redhat:enterprise_linux:6"
          ],
          "defaultStatus": "unknown",
          "packageName": "xorg-x11-server",
          "product": "Red Hat Enterprise Linux 6",
          "vendor": "Red Hat"
        }
      ],
      "datePublic": "2024-04-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
        }
      ],
      "metrics": [
        {
          "other": {
            "content": {
              "namespace": "https://access.redhat.com/security/updates/classification/",
              "value": "Important"
            },
            "type": "Red Hat severity rating"
          }
        },
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "Buffer Over-read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T21:06:17.457Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2024:1785",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "name": "RHSA-2024:2036",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "name": "RHSA-2024:2037",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "name": "RHSA-2024:2038",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "name": "RHSA-2024:2039",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "name": "RHSA-2024:2040",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "name": "RHSA-2024:2041",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "name": "RHSA-2024:2042",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "name": "RHSA-2024:2080",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "name": "RHSA-2024:2616",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "name": "RHSA-2024:3258",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "name": "RHSA-2024:3261",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "name": "RHSA-2024:3343",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "name": "RHSA-2024:9093",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "name": "RHSA-2024:9122",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "name": "RHSA-2025:12751",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "tags": [
            "vdb-entry",
            "x_refsource_REDHAT"
          ],
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "name": "RHBZ#2271997",
          "tags": [
            "issue-tracking",
            "x_refsource_REDHAT"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        }
      ],
      "timeline": [
        {
          "lang": "en",
          "time": "2024-03-28T00:00:00+00:00",
          "value": "Reported to Red Hat."
        },
        {
          "lang": "en",
          "time": "2024-04-03T00:00:00+00:00",
          "value": "Made public."
        }
      ],
      "title": "Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents",
      "workarounds": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ],
      "x_redhatCweChain": "CWE-126: Buffer Over-read"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2024-31080",
    "datePublished": "2024-04-04T13:47:33.926Z",
    "dateReserved": "2024-03-28T02:56:55.574Z",
    "dateUpdated": "2025-08-04T21:06:17.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-31080\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2024-04-04T14:15:10.330\",\"lastModified\":\"2025-08-04T21:15:28.873\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una vulnerabilidad de sobrelectura del b\u00fafer basado en mont\u00f3n en la funci\u00f3n ProcXIGetSelectedEvents() del servidor X.org. Este problema se produce cuando se utilizan valores de longitud de bytes intercambiados en las respuestas, lo que puede provocar p\u00e9rdidas de memoria y errores de segmentaci\u00f3n, especialmente cuando lo activa un cliente con una endianidad diferente. Un atacante podr\u00eda aprovechar esta vulnerabilidad para hacer que el servidor X lea los valores de la memoria din\u00e1mica y luego los transmita de vuelta al cliente hasta encontrar una p\u00e1gina no asignada, lo que provocar\u00eda un bloqueo. A pesar de la incapacidad del atacante para controlar la memoria espec\u00edfica copiada en las respuestas, los peque\u00f1os valores de longitud que normalmente se almacenan en un entero de 32 bits pueden dar como resultado importantes intentos de lecturas fuera de los l\u00edmites.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H\",\"baseScore\":7.3,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.5}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-126\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1785\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2036\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2037\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2038\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2039\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2040\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2042\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2080\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2616\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3258\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3261\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3343\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:9093\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:9122\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12751\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-31080\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2271997\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/04/03/13\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2024/04/12/10\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:1785\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2036\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2037\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2038\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2040\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2041\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:2616\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3258\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3261\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2024:3343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2024-31080\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2271997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2024/04/03/13\", \"tags\": [\"x_transferred\"]}, {\"url\": \"http://www.openwall.com/lists/oss-security/2024/04/12/10\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:1785\", \"name\": \"RHSA-2024:1785\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2036\", \"name\": \"RHSA-2024:2036\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2037\", \"name\": \"RHSA-2024:2037\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2038\", \"name\": \"RHSA-2024:2038\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2039\", \"name\": \"RHSA-2024:2039\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2040\", \"name\": \"RHSA-2024:2040\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2041\", \"name\": \"RHSA-2024:2041\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2042\", \"name\": \"RHSA-2024:2042\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2080\", \"name\": \"RHSA-2024:2080\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2616\", \"name\": \"RHSA-2024:2616\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3258\", \"name\": \"RHSA-2024:3258\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3261\", \"name\": \"RHSA-2024:3261\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3343\", \"name\": \"RHSA-2024:3343\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-31080\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2271997\", \"name\": \"RHBZ#2271997\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T01:46:04.428Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-31080\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-07T15:41:05.539453Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-03T18:18:30.800Z\"}}], \"cna\": {\"title\": \"Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"29.1.0\", \"lessThan\": \"*\", \"versionType\": \"semver\"}], \"packageName\": \"xorg-server\", \"collectionURL\": \"https://gitlab.freedesktop.org/xorg/xserver\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6 Extended Lifecycle Support  - EXTENSION\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.1.0-25.el6_10.13\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.4-29.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:7::computenode\", \"cpe:/o:redhat:enterprise_linux:7::client\", \"cpe:/o:redhat:enterprise_linux:7::server\", \"cpe:/o:redhat:enterprise_linux:7::workstation\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.8.0-33.el7_9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-2.el8_9.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/a:redhat:enterprise_linux:8::crb\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-23.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-10.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:21.1.3-16.el8_10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.11\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.11\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_tus:8.2::appstream\", \"cpe:/a:redhat:rhel_e4s:8.2::appstream\", \"cpe:/a:redhat:rhel_aus:8.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.9.0-15.el8_2.11\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.4::appstream\", \"cpe:/a:redhat:rhel_tus:8.4::appstream\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-8.el8_4.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-6.el8_6.11\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:8.8::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-15.el8_8.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.13.1-8.el9_4.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:23.2.7-1.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:9::crb\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.20.11-26.el9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.11.0-22.el9_0.11\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.2::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:1.12.0-14.el9_2.8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"tigervnc\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"xorg-x11-server-Xwayland\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"xorg-x11-server\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2024-03-28T00:00:00+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2024-04-03T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2024-04-03T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2024:1785\", \"name\": \"RHSA-2024:1785\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2036\", \"name\": \"RHSA-2024:2036\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2037\", \"name\": \"RHSA-2024:2037\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2038\", \"name\": \"RHSA-2024:2038\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2039\", \"name\": \"RHSA-2024:2039\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2040\", \"name\": \"RHSA-2024:2040\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2041\", \"name\": \"RHSA-2024:2041\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2042\", \"name\": \"RHSA-2024:2042\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2080\", \"name\": \"RHSA-2024:2080\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:2616\", \"name\": \"RHSA-2024:2616\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3258\", \"name\": \"RHSA-2024:3258\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3261\", \"name\": \"RHSA-2024:3261\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:3343\", \"name\": \"RHSA-2024:3343\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:9093\", \"name\": \"RHSA-2024:9093\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2024:9122\", \"name\": \"RHSA-2024:9122\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12751\", \"name\": \"RHSA-2025:12751\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2024-31080\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2271997\", \"name\": \"RHBZ#2271997\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-126\", \"description\": \"Buffer Over-read\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-08-04T21:06:17.457Z\"}, \"x_redhatCweChain\": \"CWE-126: Buffer Over-read\"}}",
      "cveMetadata": "{\"cveId\": \"CVE-2024-31080\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T21:06:17.457Z\", \"dateReserved\": \"2024-03-28T02:56:55.574Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2024-04-04T13:47:33.926Z\", \"assignerShortName\": \"redhat\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}
  RHSA-2024:2036
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2036",
        "url": "https://access.redhat.com/errata/RHSA-2024:2036"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2036.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:40+00:00",
      "generator": {
        "date": "2025-09-25T13:08:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2036",
      "initial_release_date": "2024-04-24T15:36:45+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2037
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2037",
        "url": "https://access.redhat.com/errata/RHSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2037.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2037",
      "initial_release_date": "2024-04-24T15:35:30+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:3343
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3343",
        "url": "https://access.redhat.com/errata/RHSA-2024:3343"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3343.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:48+00:00",
      "generator": {
        "date": "2025-09-25T13:10:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3343",
      "initial_release_date": "2024-05-23T15:35:51+00:00",
      "revision_history": [
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_9093
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9093",
        "url": "https://access.redhat.com/errata/RHSA-2024:9093"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "external",
        "summary": "RHEL-25083",
        "url": "https://issues.redhat.com/browse/RHEL-25083"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9093.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:16+00:00",
      "generator": {
        "date": "2024-11-24T14:19:16+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:9093",
      "initial_release_date": "2024-11-12T08:54:07+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:16+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2616
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2616",
        "url": "https://access.redhat.com/errata/RHSA-2024:2616"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2616.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:09:20+00:00",
      "generator": {
        "date": "2025-09-25T13:09:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2616",
      "initial_release_date": "2024-04-30T16:49:02+00:00",
      "revision_history": [
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:09:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2041
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2041",
        "url": "https://access.redhat.com/errata/RHSA-2024:2041"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2041.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:42+00:00",
      "generator": {
        "date": "2025-09-25T13:08:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2041",
      "initial_release_date": "2024-04-24T15:37:20+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:9093
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9093",
        "url": "https://access.redhat.com/errata/RHSA-2024:9093"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "external",
        "summary": "RHEL-25083",
        "url": "https://issues.redhat.com/browse/RHEL-25083"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9093.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:08:58+00:00",
      "generator": {
        "date": "2025-09-25T15:08:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:9093",
      "initial_release_date": "2024-11-12T08:54:07+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:08:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2037
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2037",
        "url": "https://access.redhat.com/errata/RHSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2037.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:18:51+00:00",
      "generator": {
        "date": "2024-11-24T14:18:51+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2037",
      "initial_release_date": "2024-04-24T15:35:30+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:18:51+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2080
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents\n(CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice\n(CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2080",
        "url": "https://access.redhat.com/errata/RHSA-2024:2080"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2080.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:46+00:00",
      "generator": {
        "date": "2025-09-25T13:08:46+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2080",
      "initial_release_date": "2024-04-29T13:07:58+00:00",
      "revision_history": [
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:46+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.src",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2616
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2616",
        "url": "https://access.redhat.com/errata/RHSA-2024:2616"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2616.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:09:20+00:00",
      "generator": {
        "date": "2025-09-25T13:09:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2616",
      "initial_release_date": "2024-04-30T16:49:02+00:00",
      "revision_history": [
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:09:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_3258
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3258",
        "url": "https://access.redhat.com/errata/RHSA-2024:3258"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3258.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:18:42+00:00",
      "generator": {
        "date": "2024-11-24T14:18:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3258",
      "initial_release_date": "2024-05-22T11:45:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:18:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_id": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-23.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-23.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2038
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2038",
        "url": "https://access.redhat.com/errata/RHSA-2024:2038"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2038.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:05+00:00",
      "generator": {
        "date": "2024-11-24T14:19:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2038",
      "initial_release_date": "2024-04-24T15:51:22+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                  "product_id": "AppStream-8.8.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2040
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2040",
        "url": "https://access.redhat.com/errata/RHSA-2024:2040"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2040.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2040",
      "initial_release_date": "2024-04-24T15:49:05+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2040
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2040",
        "url": "https://access.redhat.com/errata/RHSA-2024:2040"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2040.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2040",
      "initial_release_date": "2024-04-24T15:49:05+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_3343
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3343",
        "url": "https://access.redhat.com/errata/RHSA-2024:3343"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3343.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:05+00:00",
      "generator": {
        "date": "2024-11-24T14:19:05+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3343",
      "initial_release_date": "2024-05-23T15:35:51+00:00",
      "revision_history": [
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:05+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2037
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2037",
        "url": "https://access.redhat.com/errata/RHSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2037.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2037",
      "initial_release_date": "2024-04-24T15:35:30+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:35:30+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.9.0.Z.MAIN",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-2.el8_9.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-2.el8_9.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.src",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
        "relates_to_product_reference": "AppStream-8.9.0.Z.MAIN"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
          "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
          "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:35:30+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2037"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.src",
            "AppStream-8.9.0.Z.MAIN:tigervnc-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-debugsource-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-icons-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-license-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-selinux-0:1.13.1-2.el8_9.10.noarch",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-minimal-debuginfo-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-0:1.13.1-2.el8_9.10.x86_64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.aarch64",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.ppc64le",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.s390x",
            "AppStream-8.9.0.Z.MAIN:tigervnc-server-module-debuginfo-0:1.13.1-2.el8_9.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:9122
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9122",
        "url": "https://access.redhat.com/errata/RHSA-2024:9122"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9122.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:09:01+00:00",
      "generator": {
        "date": "2025-09-25T15:09:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:9122",
      "initial_release_date": "2024-11-12T09:42:22+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:09:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-26.el9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_id": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-26.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:1785
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the\nbasic low-level functionality that full-fledged graphical user interfaces are\ndesigned upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:1785",
        "url": "https://access.redhat.com/errata/RHSA-2024:1785"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1785.json"
      }
    ],
    "title": "Red Hat Security Advisory: X.Org server security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:04+00:00",
      "generator": {
        "date": "2025-09-25T13:08:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:1785",
      "initial_release_date": "2024-04-11T17:09:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_id": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-29.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-29.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:3258
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3258",
        "url": "https://access.redhat.com/errata/RHSA-2024:3258"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3258.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:23+00:00",
      "generator": {
        "date": "2025-09-25T13:10:23+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3258",
      "initial_release_date": "2024-05-22T11:45:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:23+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_id": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-23.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-23.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:1785
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the\nbasic low-level functionality that full-fledged graphical user interfaces are\ndesigned upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:1785",
        "url": "https://access.redhat.com/errata/RHSA-2024:1785"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1785.json"
      }
    ],
    "title": "Red Hat Security Advisory: X.Org server security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:04+00:00",
      "generator": {
        "date": "2025-09-25T13:08:04+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:1785",
      "initial_release_date": "2024-04-11T17:09:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:04+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_id": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-29.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-29.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:3258
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3258",
        "url": "https://access.redhat.com/errata/RHSA-2024:3258"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3258.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:23+00:00",
      "generator": {
        "date": "2025-09-25T13:10:23+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3258",
      "initial_release_date": "2024-05-22T11:45:11+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:45:11+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:23+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux CRB (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux CRB (v. 8)",
                  "product_id": "CRB-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_id": "xorg-x11-server-0:1.20.11-23.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-23.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-23.el8_10?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-23.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-23.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-23.el8_10.src",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch as a component of Red Hat Enterprise Linux CRB (v. 8)",
          "product_id": "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
        "relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
          "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:45:11+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3258"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-0:1.20.11-23.el8_10.src",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xnest-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xorg-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-common-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debuginfo-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-debugsource-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.aarch64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.i686",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.ppc64le",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.s390x",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-devel-0:1.20.11-23.el8_10.x86_64",
            "CRB-8.10.0.Z.MAIN.EUS:xorg-x11-server-source-0:1.20.11-23.el8_10.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:3261
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3261",
        "url": "https://access.redhat.com/errata/RHSA-2024:3261"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3261.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:24+00:00",
      "generator": {
        "date": "2025-09-25T13:10:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3261",
      "initial_release_date": "2024-05-22T11:53:58+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:9122
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9122",
        "url": "https://access.redhat.com/errata/RHSA-2024:9122"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9122.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:09:01+00:00",
      "generator": {
        "date": "2025-09-25T15:09:01+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:9122",
      "initial_release_date": "2024-11-12T09:42:22+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:09:01+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-26.el9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_id": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-26.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2616
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2616",
        "url": "https://access.redhat.com/errata/RHSA-2024:2616"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2616.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:20:08+00:00",
      "generator": {
        "date": "2024-11-24T14:20:08+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2616",
      "initial_release_date": "2024-04-30T16:49:02+00:00",
      "revision_history": [
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-30T16:49:02+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:20:08+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.4.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-8.el9_4.3?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-8.el9_4.3?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.src",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
        "relates_to_product_reference": "AppStream-9.4.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
          "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-30T16:49:02+00:00",
          "details": "For details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2616"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.src",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-8.el9_4.3.noarch",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-8.el9_4.3.x86_64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.aarch64",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.ppc64le",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.s390x",
            "AppStream-9.4.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-8.el9_4.3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2038
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2038",
        "url": "https://access.redhat.com/errata/RHSA-2024:2038"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2038.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2038",
      "initial_release_date": "2024-04-24T15:51:22+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                  "product_id": "AppStream-8.8.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2039
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2039",
        "url": "https://access.redhat.com/errata/RHSA-2024:2039"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2039.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2039",
      "initial_release_date": "2024-04-24T15:46:00+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                  "product_id": "AppStream-8.6.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.src",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:3261
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3261",
        "url": "https://access.redhat.com/errata/RHSA-2024:3261"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3261.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:24+00:00",
      "generator": {
        "date": "2025-09-25T13:10:24+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3261",
      "initial_release_date": "2024-05-22T11:53:58+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:24+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2080
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents\n(CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice\n(CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2080",
        "url": "https://access.redhat.com/errata/RHSA-2024:2080"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2080.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:46+00:00",
      "generator": {
        "date": "2025-09-25T13:08:46+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2080",
      "initial_release_date": "2024-04-29T13:07:58+00:00",
      "revision_history": [
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:46+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.src",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2038
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2038",
        "url": "https://access.redhat.com/errata/RHSA-2024:2038"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2038.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2038",
      "initial_release_date": "2024-04-24T15:51:22+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:51:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.8)",
                  "product_id": "AppStream-8.8.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-15.el8_8.10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-15.el8_8.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.src",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.8)",
          "product_id": "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
        "relates_to_product_reference": "AppStream-8.8.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
          "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
          "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:51:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2038"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.src",
            "AppStream-8.8.0.Z.EUS:tigervnc-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-debugsource-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-icons-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-license-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-selinux-0:1.12.0-15.el8_8.10.noarch",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-0:1.12.0-15.el8_8.10.x86_64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.aarch64",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.ppc64le",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.s390x",
            "AppStream-8.8.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-15.el8_8.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2080
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents\n(CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice\n(CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2080",
        "url": "https://access.redhat.com/errata/RHSA-2024:2080"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2080.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:58+00:00",
      "generator": {
        "date": "2024-11-24T14:19:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2080",
      "initial_release_date": "2024-04-29T13:07:58+00:00",
      "revision_history": [
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-29T13:07:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.src",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_id": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.8.0-33.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                "product": {
                  "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_id": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.8.0-33.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.8.0-33.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-license-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
          "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
          "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-29T13:07:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2080"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Client-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Client-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Client-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7ComputeNode-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Server-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Server-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Server-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.src",
            "7Workstation-optional-7.9.Z:tigervnc-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-debuginfo-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-icons-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-license-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-applet-0:1.8.0-33.el7_9.noarch",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.s390x",
            "7Workstation-optional-7.9.Z:tigervnc-server-minimal-0:1.8.0-33.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:tigervnc-server-module-0:1.8.0-33.el7_9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:3343
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3343",
        "url": "https://access.redhat.com/errata/RHSA-2024:3343"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3343.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:10:48+00:00",
      "generator": {
        "date": "2025-09-25T13:10:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:3343",
      "initial_release_date": "2024-05-23T15:35:51+00:00",
      "revision_history": [
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-23T15:35:51+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:10:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@21.1.3-16.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-23T15:35:51+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3343"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debuginfo-0:21.1.3-16.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:xorg-x11-server-Xwayland-debugsource-0:21.1.3-16.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2041
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2041",
        "url": "https://access.redhat.com/errata/RHSA-2024:2041"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2041.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:37+00:00",
      "generator": {
        "date": "2024-11-24T14:19:37+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2041",
      "initial_release_date": "2024-04-24T15:37:20+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:37+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2025:12751
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support  - EXTENSION.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: XTestSwapFakeInput stack overflow (CVE-2022-46340)\n\n* xorg-x11-server: XIPassiveUngrab out-of-bounds access (CVE-2022-46341)\n\n* xorg-x11-server: XvdiSelectVideoNotify use-after-free (CVE-2022-46342)\n\n* xorg-x11-server: ScreenSaverSetAttributes use-after-free (CVE-2022-46343)\n\n* xorg-x11-server: XIChangeProperty out-of-bounds access (CVE-2022-46344)\n\n* xorg-x11-server: XkbGetKbdByName use-after-free (CVE-2022-4283)\n\n* xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation (CVE-2023-0494)\n\n* xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability (CVE-2023-1393)\n\n* xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty (CVE-2023-5367)\n\n* xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty (CVE-2023-6478)\n\n* xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent (CVE-2024-21885,ZDI-CAN-22744)\n\n* xorg-x11-server: heap buffer overflow in DisableDevice (CVE-2024-21886,ZDI-CAN-22840)\n\n* xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access (CVE-2024-0229,ZDI-CAN-22678)\n\n* xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer (CVE-2023-6816)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\n* xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability (CVE-2024-9632)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2025:12751",
        "url": "https://access.redhat.com/errata/RHSA-2025:12751"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2151755",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755"
      },
      {
        "category": "external",
        "summary": "2151756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756"
      },
      {
        "category": "external",
        "summary": "2151757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757"
      },
      {
        "category": "external",
        "summary": "2151758",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758"
      },
      {
        "category": "external",
        "summary": "2151760",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760"
      },
      {
        "category": "external",
        "summary": "2151761",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761"
      },
      {
        "category": "external",
        "summary": "2165995",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995"
      },
      {
        "category": "external",
        "summary": "2180288",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288"
      },
      {
        "category": "external",
        "summary": "2243091",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
      },
      {
        "category": "external",
        "summary": "2253298",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
      },
      {
        "category": "external",
        "summary": "2256540",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
      },
      {
        "category": "external",
        "summary": "2256542",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
      },
      {
        "category": "external",
        "summary": "2256690",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
      },
      {
        "category": "external",
        "summary": "2257691",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "external",
        "summary": "2317233",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12751.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-10-09T22:36:31+00:00",
      "generator": {
        "date": "2025-10-09T22:36:31+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.9"
        }
      },
      "id": "RHSA-2025:12751",
      "initial_release_date": "2025-08-04T16:35:43+00:00",
      "revision_history": [
        {
          "date": "2025-08-04T16:35:43+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2025-08-04T16:35:43+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-10-09T22:36:31+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
                  "product_id": "6Server-ELS.EXTENSION",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
                  "product_id": "6Server-optional-ELS.EXTENSION",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:rhel_els:6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.1.0-25.el6_10.13.src",
                "product": {
                  "name": "tigervnc-0:1.1.0-25.el6_10.13.src",
                  "product_id": "tigervnc-0:1.1.0-25.el6_10.13.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
                "product": {
                  "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
                  "product_id": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
                  "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
                  "product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
                "product": {
                  "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
                  "product_id": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
                  "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.1.0-25.el6_10.13.i686",
                "product": {
                  "name": "tigervnc-0:1.1.0-25.el6_10.13.i686",
                  "product_id": "tigervnc-0:1.1.0-25.el6_10.13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.1.0-25.el6_10.13?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
                "product": {
                  "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
                  "product_id": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.1.0-25.el6_10.13?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
                  "product_id": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.1.0-25.el6_10.13?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
                "product": {
                  "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
                  "product_id": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.1.0-25.el6_10.13?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
                  "product_id": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.1.0-25.el6_10.13?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server -EXTENSION(v. 6 ELS-EXTENSION)",
          "product_id": "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.src as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.src",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686"
        },
        "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64 as a component of Red Hat Enterprise Linux Server Optional -EXTENSION (v. 6 ELS -EXTENSION)",
          "product_id": "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
        "relates_to_product_reference": "6Server-optional-ELS.EXTENSION"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-4283",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151761"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. This issue occurs because the XkbCopyNames function leaves a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: XkbGetKbdByName use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-4283"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151761",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151761"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-4283",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-4283"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4283"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: XkbGetKbdByName use-after-free"
    },
    {
      "cve": "CVE-2022-46340",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151755"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. The issue occurs due to the swap handler for the XTestFakeInput request of the XTest extension, possibly corrupting the stack if GenericEvents with lengths larger than 32 bytes are sent through the XTestFakeInput request. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions. This issue does not affect systems where the client and server use the same byte order.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: XTestSwapFakeInput stack overflow",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-46340"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151755",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151755"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46340",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-46340"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46340"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: XTestSwapFakeInput stack overflow"
    },
    {
      "cve": "CVE-2022-46341",
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151756"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. This issue occurs because the handler for the XIPassiveUngrab request accesses out-of-bounds memory when invoked with a high keycode or button code. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: XIPassiveUngrab out-of-bounds access",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-46341"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151756",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151756"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46341",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-46341"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46341"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: XIPassiveUngrab out-of-bounds access"
    },
    {
      "cve": "CVE-2022-46342",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151757"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. This flaw occurs because the handler for the XvdiSelectVideoNotify request may write to memory after it has been freed. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: XvdiSelectVideoNotify use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-46342"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151757",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151757"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46342",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-46342"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46342"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: XvdiSelectVideoNotify use-after-free"
    },
    {
      "cve": "CVE-2022-46343",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151758"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. This issue occurs because the handler for the ScreenSaverSetAttributes request may write to memory after it has been freed. This flaw can lead to local privileges elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: ScreenSaverSetAttributes use-after-free",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-46343"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151758",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151758"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46343",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-46343"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46343"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: ScreenSaverSetAttributes use-after-free"
    },
    {
      "cve": "CVE-2022-46344",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2022-12-08T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2151760"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. The issue occurs because the handler for the XIChangeProperty request has a length-validation issue, resulting in out-of-bounds memory reads and potential information disclosure. This flaw can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: XIChangeProperty out-of-bounds access",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2022-46344"
        },
        {
          "category": "external",
          "summary": "RHBZ#2151760",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2151760"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46344",
          "url": "https://www.cve.org/CVERecord?id=CVE-2022-46344"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46344"
        }
      ],
      "release_date": "2022-12-14T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: XIChangeProperty out-of-bounds access"
    },
    {
      "cve": "CVE-2023-0494",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-01-31T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2165995"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org. This issue occurs due to a dangling pointer in DeepCopyPointerClasses that can be exploited by ProcXkbSetDeviceInfo() and ProcXkbGetDeviceInfo() to read and write into freed memory. This can lead to local privilege elevation on systems where the X server runs privileged and remote code execution for ssh X forwarding sessions.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore Red Hat Enterprise Linux 8 and 9 have been rated with Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-0494"
        },
        {
          "category": "external",
          "summary": "RHBZ#2165995",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2165995"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-0494",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-0494"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-0494"
        },
        {
          "category": "external",
          "summary": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x",
          "url": "https://github.com/advisories/GHSA-5v6x-2hpj-c37x"
        }
      ],
      "release_date": "2023-02-07T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: DeepCopyPointerClasses use-after-free leads to privilege elevation"
    },
    {
      "cve": "CVE-2023-1393",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2023-03-21T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2180288"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in X.Org Server. This flaw occurs if a client explicitly destroys the compositor overlay window (aka COW), where Xserver leaves a dangling pointer to that window in the CompScreen structure, which will later trigger a use-after-free issue. The Overlay Window use-after-free issue can lead to a local privilege escalation vulnerability.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9. Therefore, Red Hat Enterprise Linux 8 and 9 have been rated Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-1393"
        },
        {
          "category": "external",
          "summary": "RHBZ#2180288",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2180288"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-1393",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-1393"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-1393"
        },
        {
          "category": "external",
          "summary": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html",
          "url": "https://lists.x.org/archives/xorg-announce/2023-March/003374.html"
        }
      ],
      "release_date": "2023-03-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: X.Org Server Overlay Window Use-After-Free Local Privilege Escalation Vulnerability"
    },
    {
      "cve": "CVE-2023-5367",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2023-10-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2243091"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A out-of-bounds write flaw was found in the xorg-x11-server. This issue occurs due to an incorrect calculation of a buffer offset when copying data stored in the heap in the XIChangeDeviceProperty function in Xi/xiproperty.c and in RRChangeOutputProperty function in randr/rrproperty.c, allowing for possible escalation of privileges or denial of service.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-5367"
        },
        {
          "category": "external",
          "summary": "RHBZ#2243091",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2243091"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-5367",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-5367"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-5367"
        },
        {
          "category": "external",
          "summary": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html",
          "url": "https://lists.x.org/archives/xorg-announce/2023-October/003430.html"
        }
      ],
      "release_date": "2023-10-25T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Out-of-bounds write in XIChangeDeviceProperty/RRChangeOutputProperty"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Peter Hutterer"
          ],
          "organization": "Red Hat",
          "summary": "This issue was discovered by Red Hat."
        }
      ],
      "cve": "CVE-2023-6478",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2023-11-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2253298"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6478"
        },
        {
          "category": "external",
          "summary": "RHBZ#2253298",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253298"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6478",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-6478"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6478"
        },
        {
          "category": "external",
          "summary": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632",
          "url": "https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632"
        },
        {
          "category": "external",
          "summary": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html",
          "url": "https://lists.x.org/archives/xorg-announce/2023-December/003435.html"
        }
      ],
      "release_date": "2023-12-13T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: out-of-bounds memory read in RRChangeOutputProperty and RRChangeProviderProperty"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jan-Niklas Sohn"
          ],
          "organization": "Trend Micro Zero Day Initiative"
        }
      ],
      "cve": "CVE-2023-6816",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2024-01-10T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2257691"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device\u0027s particular number of buttons, leading to a heap overflow if a bigger value was used.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2023-6816"
        },
        {
          "category": "external",
          "summary": "RHBZ#2257691",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2257691"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2023-6816",
          "url": "https://www.cve.org/CVERecord?id=CVE-2023-6816"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6816"
        }
      ],
      "release_date": "2024-01-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overflow in DeviceFocusEvent and ProcXIQueryPointer"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jan-Niklas Sohn"
          ],
          "organization": "Trend Micro Zero Day Initiative",
          "summary": "Acknowledged by upstream."
        }
      ],
      "cve": "CVE-2024-0229",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2024-01-03T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2256690"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "An out-of-bounds memory access flaw was found in the X.Org server. This issue can be triggered when a device frozen by a sync grab is reattached to a different master device. This issue may lead to an application crash, local privilege escalation (if the server runs with extended privileges), or remote code execution in SSH X11 forwarding environments.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-0229"
        },
        {
          "category": "external",
          "summary": "RHBZ#2256690",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256690"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-0229",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-0229"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-0229"
        }
      ],
      "release_date": "2024-01-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: reattaching to different master device may lead to out-of-bounds memory access"
    },
    {
      "cve": "CVE-2024-9632",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2024-10-08T13:37:25.514000+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2317233"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-9632"
        },
        {
          "category": "external",
          "summary": "RHBZ#2317233",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2317233"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-9632",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-9632"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-9632"
        }
      ],
      "release_date": "2024-10-29T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: tigervnc: heap-based buffer overflow privilege escalation vulnerability"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jan-Niklas Sohn"
          ],
          "organization": "Trend Micro Zero Day Initiative"
        }
      ],
      "cve": "CVE-2024-21885",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2024-01-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2256540"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in X.Org server. In the XISendDeviceHierarchyEvent function, it is possible to exceed the allocated array length when certain new device IDs are added to the xXIHierarchyInfo struct. This can trigger a heap buffer overflow condition, which may lead to an application crash or remote code execution in SSH X11 forwarding environments.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21885"
        },
        {
          "category": "external",
          "summary": "RHBZ#2256540",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256540"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21885",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21885"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21885"
        }
      ],
      "release_date": "2024-01-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: heap buffer overflow in XISendDeviceHierarchyEvent"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Jan-Niklas Sohn"
          ],
          "organization": "Trend Micro Zero Day Initiative"
        }
      ],
      "cve": "CVE-2024-21886",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2024-01-02T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2256542"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow flaw was found in the DisableDevice function in the X.Org server. This issue may lead to an application crash or, in some circumstances, remote code execution in SSH X11 forwarding environments.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: heap buffer overflow in DisableDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-21886"
        },
        {
          "category": "external",
          "summary": "RHBZ#2256542",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2256542"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-21886",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-21886"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21886"
        }
      ],
      "release_date": "2024-01-16T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: heap buffer overflow in DisableDevice"
    },
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
          "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
          "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-08-04T16:35:43+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2025:12751"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.src",
            "6Server-optional-ELS.EXTENSION:tigervnc-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-debuginfo-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.s390x",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-0:1.1.0-25.el6_10.13.x86_64",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-applet-0:1.1.0-25.el6_10.13.noarch",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.i686",
            "6Server-optional-ELS.EXTENSION:tigervnc-server-module-0:1.1.0-25.el6_10.13.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2040
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2040",
        "url": "https://access.redhat.com/errata/RHSA-2024:2040"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2040.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:15+00:00",
      "generator": {
        "date": "2024-11-24T14:19:15+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2040",
      "initial_release_date": "2024-04-24T15:49:05+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:49:05+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:15+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.2)",
                  "product_id": "AppStream-9.2.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-14.el9_2.8?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-14.el9_2.8?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.src",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.2)",
          "product_id": "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
        "relates_to_product_reference": "AppStream-9.2.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
          "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
          "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:49:05+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2040"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.src",
            "AppStream-9.2.0.Z.EUS:tigervnc-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-debugsource-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-icons-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-license-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-selinux-0:1.12.0-14.el9_2.8.noarch",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-0:1.12.0-14.el9_2.8.x86_64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.aarch64",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.ppc64le",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.s390x",
            "AppStream-9.2.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-14.el9_2.8.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2039
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2039",
        "url": "https://access.redhat.com/errata/RHSA-2024:2039"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2039.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:27+00:00",
      "generator": {
        "date": "2024-11-24T14:19:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2039",
      "initial_release_date": "2024-04-24T15:46:00+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                  "product_id": "AppStream-8.6.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.src",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2041
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2041",
        "url": "https://access.redhat.com/errata/RHSA-2024:2041"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2041.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:42+00:00",
      "generator": {
        "date": "2025-09-25T13:08:42+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2041",
      "initial_release_date": "2024-04-24T15:37:20+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:37:20+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:42+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.2::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
                  "product_id": "AppStream-8.2.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.2::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                "product": {
                  "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_id": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-applet@1.9.0-15.el8_2.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.9.0-15.el8_2.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.src as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.src",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch"
        },
        "product_reference": "tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v. 8.2)",
          "product_id": "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
        "relates_to_product_reference": "AppStream-8.2.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
          "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
          "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
          "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:37:20+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2041"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.AUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.E4S:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.ppc64le",
            "AppStream-8.2.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.src",
            "AppStream-8.2.0.Z.TUS:tigervnc-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-debugsource-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-icons-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-license-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-applet-0:1.9.0-15.el8_2.11.noarch",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-0:1.9.0-15.el8_2.11.x86_64",
            "AppStream-8.2.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.9.0-15.el8_2.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2042
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2042",
        "url": "https://access.redhat.com/errata/RHSA-2024:2042"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2042.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:43+00:00",
      "generator": {
        "date": "2025-09-25T13:08:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2042",
      "initial_release_date": "2024-04-24T15:46:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2042
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2042",
        "url": "https://access.redhat.com/errata/RHSA-2024:2042"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2042.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:48+00:00",
      "generator": {
        "date": "2024-11-24T14:19:48+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2042",
      "initial_release_date": "2024-04-24T15:46:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:48+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_9122
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the basic low-level functionality that full-fledged graphical user interfaces are designed upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9122",
        "url": "https://access.redhat.com/errata/RHSA-2024:9122"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9122.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:19:27+00:00",
      "generator": {
        "date": "2024-11-24T14:19:27+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:9122",
      "initial_release_date": "2024-11-12T09:42:22+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T09:42:22+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:19:27+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debugsource@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.11-26.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.11-26.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.11-26.el9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_id": "xorg-x11-server-0:1.20.11-26.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.11-26.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.11-26.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.11-26.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.11-26.el9.noarch as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.11-26.el9.noarch",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
          "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T09:42:22+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9122"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch",
            "CRB-9.5.0.GA:xorg-x11-server-0:1.20.11-26.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xdmx-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xephyr-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xnest-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xorg-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xvfb-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-common-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debuginfo-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-debugsource-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-devel-0:1.20.11-26.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-source-0:1.20.11-26.el9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:9093
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server-Xwayland is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Xwayland is an X server for running X clients under Wayland.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.5 Release Notes linked from the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:9093",
        "url": "https://access.redhat.com/errata/RHSA-2024:9093"
      },
      {
        "category": "external",
        "summary": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index",
        "url": "https://docs.redhat.com/en/documentation/red_hat_enterprise_linux/9/html/9.5_release_notes/index"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#moderate",
        "url": "https://access.redhat.com/security/updates/classification/#moderate"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "external",
        "summary": "RHEL-25083",
        "url": "https://issues.redhat.com/browse/RHEL-25083"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9093.json"
      }
    ],
    "title": "Red Hat Security Advisory: xorg-x11-server-Xwayland security update",
    "tracking": {
      "current_release_date": "2025-09-25T15:08:58+00:00",
      "generator": {
        "date": "2025-09-25T15:08:58+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:9093",
      "initial_release_date": "2024-11-12T08:54:07+00:00",
      "revision_history": [
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-11-12T08:54:07+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T15:08:58+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 9)",
                  "product_id": "AppStream-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat CodeReady Linux Builder (v. 9)",
                "product": {
                  "name": "Red Hat CodeReady Linux Builder (v. 9)",
                  "product_id": "CRB-9.5.0.GA",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-devel@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debugsource@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland-debuginfo@23.2.7-1.el9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_id": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@23.2.7-1.el9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
          "product_id": "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "AppStream-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
          "product_id": "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
        "relates_to_product_reference": "CRB-9.5.0.GA"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
          "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-11-12T08:54:07+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:9093"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "AppStream-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.src",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debuginfo-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-debugsource-0:23.2.7-1.el9.x86_64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.aarch64",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.i686",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.ppc64le",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.s390x",
            "CRB-9.5.0.GA:xorg-x11-server-Xwayland-devel-0:23.2.7-1.el9.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  RHSA-2024:2042
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2042",
        "url": "https://access.redhat.com/errata/RHSA-2024:2042"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2042.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:43+00:00",
      "generator": {
        "date": "2025-09-25T13:08:43+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2042",
      "initial_release_date": "2024-04-24T15:46:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:43+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.AUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.TUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)",
                  "product_id": "AppStream-8.4.0.Z.E4S",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-8.el8_4.10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-8.el8_4.10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.E4S"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.src",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)",
          "product_id": "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
        "relates_to_product_reference": "AppStream-8.4.0.Z.TUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
          "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
          "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
          "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:25+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2042"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.AUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.AUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.E4S:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.ppc64le",
            "AppStream-8.4.0.Z.E4S:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.src",
            "AppStream-8.4.0.Z.TUS:tigervnc-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-debugsource-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-icons-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-license-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-selinux-0:1.11.0-8.el8_4.10.noarch",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-minimal-debuginfo-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-0:1.11.0-8.el8_4.10.x86_64",
            "AppStream-8.4.0.Z.TUS:tigervnc-server-module-debuginfo-0:1.11.0-8.el8_4.10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2036
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2036",
        "url": "https://access.redhat.com/errata/RHSA-2024:2036"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2036.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:40+00:00",
      "generator": {
        "date": "2025-09-25T13:08:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2036",
      "initial_release_date": "2024-04-24T15:36:45+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_3261
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: Use-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:3261",
        "url": "https://access.redhat.com/errata/RHSA-2024:3261"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_3261.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:18:54+00:00",
      "generator": {
        "date": "2024-11-24T14:18:54+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:3261",
      "initial_release_date": "2024-05-22T11:53:58+00:00",
      "revision_history": [
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-05-22T11:53:58+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:18:54+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.src",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.13.1-10.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_id": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.13.1-10.el8_10?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-license-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-05-22T11:53:58+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:3261"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-debugsource-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-icons-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-license-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-selinux-0:1.13.1-10.el8_10.noarch",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-minimal-debuginfo-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-0:1.13.1-10.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:tigervnc-server-module-debuginfo-0:1.13.1-10.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_1785
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security impact of\nImportant. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "X.Org is an open-source implementation of the X Window System. It provides the\nbasic low-level functionality that full-fledged graphical user interfaces are\ndesigned upon.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:1785",
        "url": "https://access.redhat.com/errata/RHSA-2024:1785"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_1785.json"
      }
    ],
    "title": "Red Hat Security Advisory: X.Org server security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:18:28+00:00",
      "generator": {
        "date": "2024-11-24T14:18:28+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:1785",
      "initial_release_date": "2024-04-11T17:09:25+00:00",
      "revision_history": [
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-11T17:09:25+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:18:28+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client (v. 7)",
                  "product_id": "7Client-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Client Optional (v. 7)",
                  "product_id": "7Client-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
                  "product_id": "7ComputeNode-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 7)",
                  "product_id": "7Server-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server Optional (v. 7)",
                  "product_id": "7Server-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 7)",
                  "product_id": "7Workstation-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
                  "product_id": "7Workstation-optional-7.9.Z",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                "product": {
                  "name": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_id": "xorg-x11-server-0:1.20.4-29.el7_9.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server@1.20.4-29.el7_9?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                "product": {
                  "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_id": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-source@1.20.4-29.el7_9?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xorg@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xephyr@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-common@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xdmx@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xnest@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xvfb@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                "product": {
                  "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_id": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-Xwayland@1.20.4-29.el7_9?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-devel@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                "product": {
                  "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_id": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/xorg-x11-server-debuginfo@1.20.4-29.el7_9?arch=ppc"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client (v. 7)",
          "product_id": "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
          "product_id": "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Client-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
          "product_id": "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7ComputeNode-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7)",
          "product_id": "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
          "product_id": "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Server-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)",
          "product_id": "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-0:1.20.4-29.el7_9.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src"
        },
        "product_reference": "xorg-x11-server-0:1.20.4-29.el7_9.src",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64"
        },
        "product_reference": "xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
          "product_id": "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        },
        "product_reference": "xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
        "relates_to_product_reference": "7Workstation-optional-7.9.Z"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
          "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
          "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
          "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
          "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-11T17:09:25+00:00",
          "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:1785"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "7Client-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Client-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Client-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Client-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Client-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7ComputeNode-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Server-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Server-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Server-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Server-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch",
            "7Workstation-optional-7.9.Z:xorg-x11-server-0:1.20.4-29.el7_9.src",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xdmx-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xephyr-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xnest-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xorg-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xvfb-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-Xwayland-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-common-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.s390x",
            "7Workstation-optional-7.9.Z:xorg-x11-server-debuginfo-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.i686",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.ppc64le",
            "7Workstation-optional-7.9.Z:xorg-x11-server-devel-0:1.20.4-29.el7_9.x86_64",
            "7Workstation-optional-7.9.Z:xorg-x11-server-source-0:1.20.4-29.el7_9.noarch"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024:2039
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2039",
        "url": "https://access.redhat.com/errata/RHSA-2024:2039"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2039.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2025-09-25T13:08:41+00:00",
      "generator": {
        "date": "2025-09-25T13:08:41+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.6.8"
        }
      },
      "id": "RHSA-2024:2039",
      "initial_release_date": "2024-04-24T15:46:00+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:46:00+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2025-09-25T13:08:41+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.8.6)",
                  "product_id": "AppStream-8.6.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:8.6::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.12.0-6.el8_6.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.12.0-6.el8_6.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.src",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.8.6)",
          "product_id": "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
        "relates_to_product_reference": "AppStream-8.6.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
          "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
          "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:46:00+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2039"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.src",
            "AppStream-8.6.0.Z.EUS:tigervnc-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-debugsource-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-icons-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-license-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-selinux-0:1.12.0-6.el8_6.11.noarch",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-0:1.12.0-6.el8_6.11.x86_64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.aarch64",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.ppc64le",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.s390x",
            "AppStream-8.6.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.12.0-6.el8_6.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  rhsa-2024_2036
Vulnerability from csaf_redhat
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for tigervnc is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Virtual Network Computing (VNC) is a remote display system which allows users to view a computing desktop environment not only on the machine where it is running, but from anywhere on the Internet and from a wide variety of machine architectures. TigerVNC is a suite of VNC servers and clients.\n\nSecurity Fix(es):\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents (CVE-2024-31080)\n\n* xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice (CVE-2024-31081)\n\n* xorg-x11-server: User-after-free in ProcRenderAddGlyphs (CVE-2024-31083)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2024:2036",
        "url": "https://access.redhat.com/errata/RHSA-2024:2036"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2271997",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
      },
      {
        "category": "external",
        "summary": "2271998",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
      },
      {
        "category": "external",
        "summary": "2272000",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_2036.json"
      }
    ],
    "title": "Red Hat Security Advisory: tigervnc security update",
    "tracking": {
      "current_release_date": "2024-11-24T14:18:40+00:00",
      "generator": {
        "date": "2024-11-24T14:18:40+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2024:2036",
      "initial_release_date": "2024-04-24T15:36:45+00:00",
      "revision_history": [
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2024-04-24T15:36:45+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-24T14:18:40+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
                  "product_id": "AppStream-9.0.0.Z.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debugsource@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-minimal-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                "product": {
                  "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_id": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-server-module-debuginfo@1.11.0-22.el9_0.11?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-icons@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-license@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                "product": {
                  "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_id": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/tigervnc-selinux@1.11.0-22.el9_0.11?arch=noarch"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.src",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch"
        },
        "product_reference": "tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
          "product_id": "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        },
        "product_reference": "tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
        "relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271997"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "The Xorg server is not configured to run with root privileges in Red Hat Enterprise Linux 8 and 9. Consequently, these versions have been assigned a Moderate severity rating.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271997",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31080",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIGetSelectedEvents"
    },
    {
      "cve": "CVE-2024-31081",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2271998"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "RHBZ#2271998",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271998"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31081",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31081"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Heap buffer overread/data leakage in ProcXIPassiveGrabDevice"
    },
    {
      "cve": "CVE-2024-31083",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "discovery_date": "2024-03-28T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2272000"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Xorg server does not run with root privileges in Red Hat Enterprise Linux 8 and 9, therefore, Red Hat Enterprise Linux 8 and 9 have been rated with a Moderate severity.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
          "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
          "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "RHBZ#2272000",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2272000"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2024-31083",
          "url": "https://www.cve.org/CVERecord?id=CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31083"
        }
      ],
      "release_date": "2024-04-03T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-04-24T15:36:45+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2024:2036"
        },
        {
          "category": "workaround",
          "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
          "product_ids": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.src",
            "AppStream-9.0.0.Z.EUS:tigervnc-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-debugsource-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-icons-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-license-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-selinux-0:1.11.0-22.el9_0.11.noarch",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-minimal-debuginfo-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-0:1.11.0-22.el9_0.11.x86_64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.aarch64",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.ppc64le",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.s390x",
            "AppStream-9.0.0.Z.EUS:tigervnc-server-module-debuginfo-0:1.11.0-22.el9_0.11.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "xorg-x11-server: Use-after-free in ProcRenderAddGlyphs"
    }
  ]
}
  ghsa-mqqf-4p7r-rf89
Vulnerability from github
A heap-based buffer over-read vulnerability was found in the X.org server's ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker's inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.
{
  "affected": [],
  "aliases": [
    "CVE-2024-31080"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-126"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2024-04-04T14:15:10Z",
    "severity": "HIGH"
  },
  "details": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
  "id": "GHSA-mqqf-4p7r-rf89",
  "modified": "2025-08-04T21:30:37Z",
  "published": "2024-04-04T15:30:34Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-31080"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV"
    },
    {
      "type": "WEB",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V"
    },
    {
      "type": "WEB",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
    },
    {
      "type": "WEB",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2025:12751"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:9122"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:9093"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:3343"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:3261"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:3258"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2616"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2080"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2042"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2041"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2040"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2039"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2038"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2037"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:2036"
    },
    {
      "type": "WEB",
      "url": "https://access.redhat.com/errata/RHSA-2024:1785"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2024/04/03/13"
    },
    {
      "type": "WEB",
      "url": "http://www.openwall.com/lists/oss-security/2024/04/12/10"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
      "type": "CVSS_V3"
    }
  ]
}
  opensuse-su-2024:13828-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "xorg-x11-server-21.1.12-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the xorg-x11-server-21.1.12-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13828",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13828-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31082 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "xorg-x11-server-21.1.12-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13828-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-21.1.12-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-21.1.12-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-extra-21.1.12-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-sdk-21.1.12-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-source-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-source-21.1.12-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
                  "product_id": "xorg-x11-server-wrapper-21.1.12-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-21.1.12-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-extra-21.1.12-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-sdk-21.1.12-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-source-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-source-21.1.12-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
                  "product_id": "xorg-x11-server-wrapper-21.1.12-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-21.1.12-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-Xvfb-21.1.12-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-extra-21.1.12-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-sdk-21.1.12-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-source-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-source-21.1.12-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wrapper-21.1.12-1.1.s390x",
                "product": {
                  "name": "xorg-x11-server-wrapper-21.1.12-1.1.s390x",
                  "product_id": "xorg-x11-server-wrapper-21.1.12-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-21.1.12-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-21.1.12-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-extra-21.1.12-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-sdk-21.1.12-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-source-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-source-21.1.12-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wrapper-21.1.12-1.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-wrapper-21.1.12-1.1.x86_64",
                  "product_id": "xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-source-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-source-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-source-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-source-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-wrapper-21.1.12-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64"
        },
        "product_reference": "xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-wrapper-21.1.12-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-wrapper-21.1.12-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x"
        },
        "product_reference": "xorg-x11-server-wrapper-21.1.12-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-wrapper-21.1.12-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
        },
        "product_reference": "xorg-x11-server-wrapper-21.1.12-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31082",
          "url": "https://www.suse.com/security/cve/CVE-2024-31082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222311 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
          "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-Xvfb-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-extra-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-sdk-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-source-21.1.12-1.1.x86_64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.aarch64",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.ppc64le",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.s390x",
            "openSUSE Tumbleweed:xorg-x11-server-wrapper-21.1.12-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  opensuse-su-2024:13829-1
Vulnerability from csaf_opensuse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "xwayland-23.2.5-1.1 on GA media",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "These are all security issues fixed in the xwayland-23.2.5-1.1 package on the GA media of openSUSE Tumbleweed.",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Tumbleweed-2024-13829",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13829-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "xwayland-23.2.5-1.1 on GA media",
    "tracking": {
      "current_release_date": "2024-06-15T00:00:00Z",
      "generator": {
        "date": "2024-06-15T00:00:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2024:13829-1",
      "initial_release_date": "2024-06-15T00:00:00Z",
      "revision_history": [
        {
          "date": "2024-06-15T00:00:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-23.2.5-1.1.aarch64",
                "product": {
                  "name": "xwayland-23.2.5-1.1.aarch64",
                  "product_id": "xwayland-23.2.5-1.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-23.2.5-1.1.aarch64",
                "product": {
                  "name": "xwayland-devel-23.2.5-1.1.aarch64",
                  "product_id": "xwayland-devel-23.2.5-1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-23.2.5-1.1.ppc64le",
                "product": {
                  "name": "xwayland-23.2.5-1.1.ppc64le",
                  "product_id": "xwayland-23.2.5-1.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-23.2.5-1.1.ppc64le",
                "product": {
                  "name": "xwayland-devel-23.2.5-1.1.ppc64le",
                  "product_id": "xwayland-devel-23.2.5-1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-23.2.5-1.1.s390x",
                "product": {
                  "name": "xwayland-23.2.5-1.1.s390x",
                  "product_id": "xwayland-23.2.5-1.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-23.2.5-1.1.s390x",
                "product": {
                  "name": "xwayland-devel-23.2.5-1.1.s390x",
                  "product_id": "xwayland-devel-23.2.5-1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-23.2.5-1.1.x86_64",
                "product": {
                  "name": "xwayland-23.2.5-1.1.x86_64",
                  "product_id": "xwayland-23.2.5-1.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-23.2.5-1.1.x86_64",
                "product": {
                  "name": "xwayland-devel-23.2.5-1.1.x86_64",
                  "product_id": "xwayland-devel-23.2.5-1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Tumbleweed",
                "product": {
                  "name": "openSUSE Tumbleweed",
                  "product_id": "openSUSE Tumbleweed",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:tumbleweed"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-23.2.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64"
        },
        "product_reference": "xwayland-23.2.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-23.2.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le"
        },
        "product_reference": "xwayland-23.2.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-23.2.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x"
        },
        "product_reference": "xwayland-23.2.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-23.2.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64"
        },
        "product_reference": "xwayland-23.2.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-23.2.5-1.1.aarch64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64"
        },
        "product_reference": "xwayland-devel-23.2.5-1.1.aarch64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-23.2.5-1.1.ppc64le as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le"
        },
        "product_reference": "xwayland-devel-23.2.5-1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-23.2.5-1.1.s390x as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x"
        },
        "product_reference": "xwayland-devel-23.2.5-1.1.s390x",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-23.2.5-1.1.x86_64 as component of openSUSE Tumbleweed",
          "product_id": "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
        },
        "product_reference": "xwayland-devel-23.2.5-1.1.x86_64",
        "relates_to_product_reference": "openSUSE Tumbleweed"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
          "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-23.2.5-1.1.x86_64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.aarch64",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.ppc64le",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.s390x",
            "openSUSE Tumbleweed:xwayland-devel-23.2.5-1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-06-15T00:00:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  fkie_cve-2024-31080
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:1785 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2036 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2037 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2038 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2039 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2040 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2041 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2042 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2080 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:2616 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:3258 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:3261 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:3343 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:9093 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2024:9122 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12751 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2024-31080 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2271997 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/04/03/13 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2024/04/12/10 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:1785 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2036 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2037 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2038 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2039 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2040 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2041 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2042 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2080 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:2616 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:3258 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:3261 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2024:3343 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2024-31080 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2271997 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/ | 
| Vendor | Product | Version | 
|---|
{
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
    },
    {
      "lang": "es",
      "value": "Se encontr\u00f3 una vulnerabilidad de sobrelectura del b\u00fafer basado en mont\u00f3n en la funci\u00f3n ProcXIGetSelectedEvents() del servidor X.org. Este problema se produce cuando se utilizan valores de longitud de bytes intercambiados en las respuestas, lo que puede provocar p\u00e9rdidas de memoria y errores de segmentaci\u00f3n, especialmente cuando lo activa un cliente con una endianidad diferente. Un atacante podr\u00eda aprovechar esta vulnerabilidad para hacer que el servidor X lea los valores de la memoria din\u00e1mica y luego los transmita de vuelta al cliente hasta encontrar una p\u00e1gina no asignada, lo que provocar\u00eda un bloqueo. A pesar de la incapacidad del atacante para controlar la memoria espec\u00edfica copiada en las respuestas, los peque\u00f1os valores de longitud que normalmente se almacenan en un entero de 32 bits pueden dar como resultado importantes intentos de lecturas fuera de los l\u00edmites."
    }
  ],
  "id": "CVE-2024-31080",
  "lastModified": "2025-08-04T21:15:28.873",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.5,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-04-04T14:15:10.330",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:1785"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2036"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2037"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2038"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2039"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2040"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2041"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2042"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2080"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:2616"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:3258"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:3261"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:3343"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:9093"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2024:9122"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/errata/RHSA-2025:12751"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/04/03/13"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2024/04/12/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:1785"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2036"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2040"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2041"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2042"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:2616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:3258"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:3261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/errata/RHSA-2024:3343"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Awaiting Analysis",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-126"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Secondary"
    }
  ]
}
  suse-su-2024:1261-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xorg-x11-server",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).\n- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).\n- CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).\n- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).\n\nOther fixes:\n- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1261,SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1261,SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1261,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1261,SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1261,SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1261,SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1261,SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1261,SUSE-SLE-Product-WE-15-SP5-2024-1261,SUSE-Storage-7.1-2024-1261",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1261-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1261-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241261-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1261-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034962.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222311",
        "url": "https://bugzilla.suse.com/1222311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222442",
        "url": "https://bugzilla.suse.com/1222442"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31082 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for xorg-x11-server",
    "tracking": {
      "current_release_date": "2024-04-12T13:05:11Z",
      "generator": {
        "date": "2024-04-12T13:05:11Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1261-1",
      "initial_release_date": "2024-04-12T13:05:11Z",
      "revision_history": [
        {
          "date": "2024-04-12T13:05:11Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
                  "product_id": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
                  "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.aarch64",
                  "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.aarch64",
                  "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.i586",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.i586",
                  "product_id": "xorg-x11-server-1.20.3-150200.22.5.96.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.i586",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.i586",
                  "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.i586",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.i586",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.i586",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.i586",
                  "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.i586",
                "product": {
                  "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.i586",
                  "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
                  "product_id": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
                  "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.ppc64le",
                  "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.ppc64le",
                  "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
                  "product_id": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
                  "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.s390x",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.s390x",
                  "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.s390x",
                "product": {
                  "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.s390x",
                  "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
                  "product_id": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
                  "product_id": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.x86_64",
                  "product_id": "xorg-x11-server-source-1.20.3-150200.22.5.96.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64",
                  "product_id": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp2"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Enterprise Storage 7.1",
                "product": {
                  "name": "SUSE Enterprise Storage 7.1",
                  "product_id": "SUSE Enterprise Storage 7.1",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:ses:7.1"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP2-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP2-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP2",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64 as component of SUSE Enterprise Storage 7.1",
          "product_id": "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
        "relates_to_product_reference": "SUSE Enterprise Storage 7.1"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31082",
          "url": "https://www.suse.com/security/cve/CVE-2024-31082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222311 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
          "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Enterprise Storage 7.1:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP2-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.s390x",
            "SUSE Linux Enterprise Server 15 SP3-LTSS:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP2:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-extra-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP3:xorg-x11-server-sdk-1.20.3-150200.22.5.96.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xorg-x11-server-wayland-1.20.3-150200.22.5.96.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:11Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  suse-su-2024:2776-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for dri3proto, presentproto, wayland-protocols, xwayland",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for dri3proto, presentproto, wayland-protocols, xwayland fixes the following issues:\n\nChanges in presentproto:\n\n* update to version 1.4 (patch generated from xorgproto-2024.1 sources)\n\nChanges in wayland-protocols:\n\n- Update to version 1.36:\n\n  * xdg-dialog: fix missing namespace in protocol name\n\n- Changes from version 1.35:\n\n  * cursor-shape-v1: Does not advertises the list of supported cursors\n  * xdg-shell: add missing enum attribute to set_constraint_adjustment\n  * xdg-shell: recommend against drawing decorations when tiled\n  * tablet-v2: mark as stable\n  * staging: add alpha-modifier protocol\n\n- Update to 1.36\n\n  * Fix to the xdg dialog protocol\n  * tablet-v2 protocol is now stable\n  * alpha-modifier: new protocol\n  * Bug fix to the cursor shape documentation\n  * The xdg-shell protocol now also explicitly recommends against\n    drawing decorations outside of the window geometry when tiled\n\n- Update to 1.34:\n\n  * xdg-dialog: new protocol\n  * xdg-toplevel-drag: new protocol\n  * Fix typo in ext-foreign-toplevel-list-v1\n  * tablet-v2: clarify that name/id events are optional\n  * linux-drm-syncobj-v1: new protocol\n  * linux-explicit-synchronization-v1: add linux-drm-syncobj note\n\n- Update to version 1.33:\n\n  * xdg-shell: Clarify what a toplevel by default includes\n  * linux-dmabuf: sync changes from unstable to stable\n  * linux-dmabuf: require all planes to use the same modifier\n  * presentation-time: stop referring to Linux/glibc\n  * security-context-v1: Make sandbox engine names use reverse-DNS\n  * xdg-decoration: remove ambiguous wording in configure event\n  * xdg-decoration: fix configure event summary\n  * linux-dmabuf: mark as stable\n  * linux-dmabuf: add note about implicit sync\n  * security-context-v1: Document what can be done with the open\n    sockets\n  * security-context-v1: Document out of band metadata for flatpak\n\nChanges in dri3proto:\n\n* update to version 1.4 (patch generated from xorgproto-2024.1 sources)\n\nChanges in xwayland:\n\n\n- Update to bugfix release 24.1.1 for the current stable 24.1\n  branch of Xwayland\n\n  * xwayland: fix segment fault in `xwl_glamor_gbm_init_main_dev`\n  * os: Explicitly include X11/Xmd.h for CARD32 definition to fix\n    building on i686\n  * present: On *BSD, epoll-shim is needed to emulate eventfd()\n  * xwayland: Stop on first unmapped child\n  * xwayland/window-buffers: Promote xwl_window_buffer\n  * xwayland/window-buffers: Add xwl_window_buffer_release()\n  * xwayland/glamor/gbm: Copy explicit sync code to GLAMOR/GBM\n  * xwayland/window-buffers: Use synchronization from GLAMOR/GBM\n  * xwayland/window-buffers: Do not always set syncpnts\n  * xwayland/window-buffers: Move code to submit pixmaps\n  * xwayland/window-buffers: Set syncpnts for all pixmaps\n  * xwayland: Move xwl_window disposal to its own function\n  * xwayland: Make sure we do not leak xwl_window on destroy\n  * wayland/window-buffers: Move buffer disposal to its own function\n  * xwayland/window-buffers: optionally force disposal\n  * wayland: Force disposal of windows buffers for root on destroy\n  * xwayland: Check for pointer in xwl_seat_leave_ptr()\n  * xwayland: remove includedir from pkgconfig\n\n- disable DPMS on sle15 due to missing proto package\n\n- Update to feature release 24.1.0\n  * This fixes a couple of regressions introduced in the previous release\n    candidate versions along with a fix for XTEST emulation with EI.\n    + xwayland: Send ei_device_frame on device_scroll_discrete\n    + xwayland: Restore the ResizeWindow handler\n    + xwayland: Handle rootful resize in ResizeWindow\n    + xwayland: Move XRandR emulation to the ResizeWindow hook\n    + xwayland: Use correct xwl_window lookup function in xwl_set_shape\n- eglstreams has been dropped\n\n- Update to bug fix relesae 23.2.7\n  * m4: drop autoconf leftovers\n  * xwayland: Send ei_device_frame on device_scroll_discrete\n  * xwayland: Call drmFreeDevice for dma-buf default feedback\n  * xwayland: Use drmDevicesEqual in xwl_dmabuf_feedback_tranche_done\n  * dri3: Free formats in cache_formats_and_modifiers\n  * xwayland/glamor: Handle depth 15 in gbm_format_for_depth\n  * Revert \u0027xwayland/glamor: Avoid implicit redirection with depth 32 parent windows\u0027\n  * xwayland: Check for outputs before lease devices\n  * xwayland: Do not remove output on withdraw if leased\n\n- Update to 23.2.6\n  * This is a quick bug fix release to address a regression\n    introduced by the fix for CVE-2024-31083 in xwayland-23.2.5.\n\n- Security update 23.2.5 \n\n  This release contains the 3 security fixes that actually apply to\n  Xwayland reported in the security advisory of April 3rd 2024\n\n  * CVE-2024-31080\n  * CVE-2024-31081\n  * CVE-2024-31083\n\n  Additionally, it also contains a couple of other fixes, a copy/paste\n  error in the DeviceStateNotify event and a fix to enable buttons with\n  pointer gestures for backward compatibility with legacy X11 clients.\n\n- Don\u0027t provide xorg-x11-server-source\n  * xwayland sources are not meant for a generic server.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-2776,SUSE-SLE-Module-Development-Tools-15-SP5-2024-2776,SUSE-SLE-Module-Development-Tools-15-SP6-2024-2776,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2024-2776,SUSE-SLE-Product-WE-15-SP6-2024-2776,openSUSE-SLE-15.5-2024-2776,openSUSE-SLE-15.6-2024-2776",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_2776-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:2776-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20242776-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:2776-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1219892",
        "url": "https://bugzilla.suse.com/1219892"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222442",
        "url": "https://bugzilla.suse.com/1222442"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for dri3proto, presentproto, wayland-protocols, xwayland",
    "tracking": {
      "current_release_date": "2024-08-06T12:33:59Z",
      "generator": {
        "date": "2024-08-06T12:33:59Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:2776-1",
      "initial_release_date": "2024-08-06T12:33:59Z",
      "revision_history": [
        {
          "date": "2024-08-06T12:33:59Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
                "product": {
                  "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
                  "product_id": "dri3proto-devel-1.2-150100.6.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "presentproto-devel-1.3-150600.3.3.1.aarch64",
                "product": {
                  "name": "presentproto-devel-1.3-150600.3.3.1.aarch64",
                  "product_id": "presentproto-devel-1.3-150600.3.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-24.1.1-150600.5.3.1.aarch64",
                "product": {
                  "name": "xwayland-24.1.1-150600.5.3.1.aarch64",
                  "product_id": "xwayland-24.1.1-150600.5.3.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-24.1.1-150600.5.3.1.aarch64",
                "product": {
                  "name": "xwayland-devel-24.1.1-150600.5.3.1.aarch64",
                  "product_id": "xwayland-devel-24.1.1-150600.5.3.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dri3proto-devel-1.2-150100.6.3.1.i586",
                "product": {
                  "name": "dri3proto-devel-1.2-150100.6.3.1.i586",
                  "product_id": "dri3proto-devel-1.2-150100.6.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "presentproto-devel-1.3-150600.3.3.1.i586",
                "product": {
                  "name": "presentproto-devel-1.3-150600.3.3.1.i586",
                  "product_id": "presentproto-devel-1.3-150600.3.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-24.1.1-150600.5.3.1.i586",
                "product": {
                  "name": "xwayland-24.1.1-150600.5.3.1.i586",
                  "product_id": "xwayland-24.1.1-150600.5.3.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-24.1.1-150600.5.3.1.i586",
                "product": {
                  "name": "xwayland-devel-24.1.1-150600.5.3.1.i586",
                  "product_id": "xwayland-devel-24.1.1-150600.5.3.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "wayland-protocols-devel-1.36-150600.4.3.1.noarch",
                "product": {
                  "name": "wayland-protocols-devel-1.36-150600.4.3.1.noarch",
                  "product_id": "wayland-protocols-devel-1.36-150600.4.3.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
                "product": {
                  "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
                  "product_id": "dri3proto-devel-1.2-150100.6.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "presentproto-devel-1.3-150600.3.3.1.ppc64le",
                "product": {
                  "name": "presentproto-devel-1.3-150600.3.3.1.ppc64le",
                  "product_id": "presentproto-devel-1.3-150600.3.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-24.1.1-150600.5.3.1.ppc64le",
                "product": {
                  "name": "xwayland-24.1.1-150600.5.3.1.ppc64le",
                  "product_id": "xwayland-24.1.1-150600.5.3.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
                "product": {
                  "name": "xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
                  "product_id": "xwayland-devel-24.1.1-150600.5.3.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dri3proto-devel-1.2-150100.6.3.1.s390x",
                "product": {
                  "name": "dri3proto-devel-1.2-150100.6.3.1.s390x",
                  "product_id": "dri3proto-devel-1.2-150100.6.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "presentproto-devel-1.3-150600.3.3.1.s390x",
                "product": {
                  "name": "presentproto-devel-1.3-150600.3.3.1.s390x",
                  "product_id": "presentproto-devel-1.3-150600.3.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-24.1.1-150600.5.3.1.s390x",
                "product": {
                  "name": "xwayland-24.1.1-150600.5.3.1.s390x",
                  "product_id": "xwayland-24.1.1-150600.5.3.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-24.1.1-150600.5.3.1.s390x",
                "product": {
                  "name": "xwayland-devel-24.1.1-150600.5.3.1.s390x",
                  "product_id": "xwayland-devel-24.1.1-150600.5.3.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
                "product": {
                  "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
                  "product_id": "dri3proto-devel-1.2-150100.6.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "presentproto-devel-1.3-150600.3.3.1.x86_64",
                "product": {
                  "name": "presentproto-devel-1.3-150600.3.3.1.x86_64",
                  "product_id": "presentproto-devel-1.3-150600.3.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-24.1.1-150600.5.3.1.x86_64",
                "product": {
                  "name": "xwayland-24.1.1-150600.5.3.1.x86_64",
                  "product_id": "xwayland-24.1.1-150600.5.3.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-24.1.1-150600.5.3.1.x86_64",
                "product": {
                  "name": "xwayland-devel-24.1.1-150600.5.3.1.x86_64",
                  "product_id": "xwayland-devel-24.1.1-150600.5.3.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
                  "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:packagehub:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP6",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp6"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.6",
                "product": {
                  "name": "openSUSE Leap 15.6",
                  "product_id": "openSUSE Leap 15.6",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.6"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wayland-protocols-devel-1.36-150600.4.3.1.noarch as component of SUSE Linux Enterprise Module for Package Hub 15 SP6",
          "product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch"
        },
        "product_reference": "wayland-protocols-devel-1.36-150600.4.3.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-24.1.1-150600.5.3.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP6",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64"
        },
        "product_reference": "xwayland-24.1.1-150600.5.3.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dri3proto-devel-1.2-150100.6.3.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64"
        },
        "product_reference": "dri3proto-devel-1.2-150100.6.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "presentproto-devel-1.3-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64"
        },
        "product_reference": "presentproto-devel-1.3-150600.3.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "wayland-protocols-devel-1.36-150600.4.3.1.noarch as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch"
        },
        "product_reference": "wayland-protocols-devel-1.36-150600.4.3.1.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-24.1.1-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64"
        },
        "product_reference": "xwayland-24.1.1-150600.5.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-24.1.1-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le"
        },
        "product_reference": "xwayland-24.1.1-150600.5.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-24.1.1-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x"
        },
        "product_reference": "xwayland-24.1.1-150600.5.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-24.1.1-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64"
        },
        "product_reference": "xwayland-24.1.1-150600.5.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-24.1.1-150600.5.3.1.aarch64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64"
        },
        "product_reference": "xwayland-devel-24.1.1-150600.5.3.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-24.1.1-150600.5.3.1.ppc64le as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le"
        },
        "product_reference": "xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-24.1.1-150600.5.3.1.s390x as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x"
        },
        "product_reference": "xwayland-devel-24.1.1-150600.5.3.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-24.1.1-150600.5.3.1.x86_64 as component of openSUSE Leap 15.6",
          "product_id": "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
        },
        "product_reference": "xwayland-devel-24.1.1-150600.5.3.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-08-06T12:33:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-08-06T12:33:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
          "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
          "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
          "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
          "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "SUSE Linux Enterprise Module for Package Hub 15 SP6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "SUSE Linux Enterprise Workstation Extension 15 SP6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.5:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.aarch64",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.ppc64le",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.s390x",
            "openSUSE Leap 15.6:dri3proto-devel-1.2-150100.6.3.1.x86_64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.aarch64",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.ppc64le",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.s390x",
            "openSUSE Leap 15.6:presentproto-devel-1.3-150600.3.3.1.x86_64",
            "openSUSE Leap 15.6:wayland-protocols-devel-1.36-150600.4.3.1.noarch",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-24.1.1-150600.5.3.1.x86_64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.aarch64",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.ppc64le",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.s390x",
            "openSUSE Leap 15.6:xwayland-devel-24.1.1-150600.5.3.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-08-06T12:33:59Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  suse-su-2024:1262-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xorg-x11-server",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).\n- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).\n- CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).\n- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).\n\nOther fixes:\n- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1262,SUSE-SLE-Module-Basesystem-15-SP5-2024-1262,SUSE-SLE-Module-Development-Tools-15-SP5-2024-1262,openSUSE-SLE-15.5-2024-1262",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1262-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1262-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241262-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1262-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034961.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222311",
        "url": "https://bugzilla.suse.com/1222311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222442",
        "url": "https://bugzilla.suse.com/1222442"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31082 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for xorg-x11-server",
    "tracking": {
      "current_release_date": "2024-04-12T13:05:25Z",
      "generator": {
        "date": "2024-04-12T13:05:25Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1262-1",
      "initial_release_date": "2024-04-12T13:05:25Z",
      "revision_history": [
        {
          "date": "2024-04-12T13:05:25Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
                  "product_id": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
                  "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
                  "product_id": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
                  "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
                  "product_id": "xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.4-150500.7.26.1.i586",
                "product": {
                  "name": "xorg-x11-server-21.1.4-150500.7.26.1.i586",
                  "product_id": "xorg-x11-server-21.1.4-150500.7.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.i586",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.i586",
                  "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.i586",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.i586",
                  "product_id": "xorg-x11-server-extra-21.1.4-150500.7.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.i586",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.i586",
                  "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.i586",
                "product": {
                  "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.i586",
                  "product_id": "xorg-x11-server-source-21.1.4-150500.7.26.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
                  "product_id": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
                  "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
                  "product_id": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
                  "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
                  "product_id": "xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.4-150500.7.26.1.s390x",
                "product": {
                  "name": "xorg-x11-server-21.1.4-150500.7.26.1.s390x",
                  "product_id": "xorg-x11-server-21.1.4-150500.7.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
                  "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
                  "product_id": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
                  "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
                "product": {
                  "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
                  "product_id": "xorg-x11-server-source-21.1.4-150500.7.26.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
                  "product_id": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
                  "product_id": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
                  "product_id": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
                  "product_id": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64",
                  "product_id": "xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
          "product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64"
        },
        "product_reference": "xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x"
        },
        "product_reference": "xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
        },
        "product_reference": "xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:25Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:25Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31082",
          "url": "https://www.suse.com/security/cve/CVE-2024-31082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222311 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:25Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
          "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Basesystem 15 SP5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "SUSE Linux Enterprise Module for Development Tools 15 SP5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-Xvfb-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-extra-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-sdk-21.1.4-150500.7.26.1.x86_64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.aarch64",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.ppc64le",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.s390x",
            "openSUSE Leap 15.5:xorg-x11-server-source-21.1.4-150500.7.26.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:05:25Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  suse-su-2024:1199-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xorg-x11-server",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).\n- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).\n- CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).\n- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1199,SUSE-SLE-SDK-12-SP5-2024-1199,SUSE-SLE-SERVER-12-SP5-2024-1199",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1199-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1199-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241199-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1199-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034927.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222311",
        "url": "https://bugzilla.suse.com/1222311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31082 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for xorg-x11-server",
    "tracking": {
      "current_release_date": "2024-04-10T13:54:58Z",
      "generator": {
        "date": "2024-04-10T13:54:58Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1199-1",
      "initial_release_date": "2024-04-10T13:54:58Z",
      "revision_history": [
        {
          "date": "2024-04-10T13:54:58Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.aarch64",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.aarch64",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.i586",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.i586",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.i586",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.i586",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.i586",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.i586",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.i586",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.i586",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.ppc64le",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.ppc64le",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.s390",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.s390",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.s390",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.s390",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.s390"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.s390",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.s390",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.s390"
                }
              }
            ],
            "category": "architecture",
            "name": "s390"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.s390x",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.s390x",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390x",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390x",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.s390x",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.s390x",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.19.6-10.71.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-1.19.6-10.71.1.x86_64",
                  "product_id": "xorg-x11-server-1.19.6-10.71.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
                  "product_id": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.19.6-10.71.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.19.6-10.71.1.x86_64",
                  "product_id": "xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.19.6-10.71.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-source-1.19.6-10.71.1.x86_64",
                  "product_id": "xorg-x11-server-source-1.19.6-10.71.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.19.6-10.71.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.19.6-10.71.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.19.6-10.71.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.19.6-10.71.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
          "product_id": "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.19.6-10.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.19.6-10.71.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-10T13:54:58Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-10T13:54:58Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31082",
          "url": "https://www.suse.com/security/cve/CVE-2024-31082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222311 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-10T13:54:58Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP5:xorg-x11-server-extra-1.19.6-10.71.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP5:xorg-x11-server-sdk-1.19.6-10.71.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-10T13:54:58Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  suse-su-2024:1260-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xorg-x11-server",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xorg-x11-server fixes the following issues:\n\n- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).\n- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).\n- CVE-2024-31082: Fixed ProcAppleDRICreatePixmap to use unswapped length to send reply (bsc#1222311).\n- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).\n\nOther fixes:\n- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1260,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1260,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1260,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1260,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1260,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1260,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-1260,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2024-1260",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1260-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1260-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241260-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1260-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034963.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222311",
        "url": "https://bugzilla.suse.com/1222311"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222442",
        "url": "https://bugzilla.suse.com/1222442"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31082 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31082/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for xorg-x11-server",
    "tracking": {
      "current_release_date": "2024-04-12T13:04:14Z",
      "generator": {
        "date": "2024-04-12T13:04:14Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1260-1",
      "initial_release_date": "2024-04-12T13:04:14Z",
      "revision_history": [
        {
          "date": "2024-04-12T13:04:14Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
                  "product_id": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
                  "product_id": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.aarch64",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.aarch64",
                  "product_id": "xorg-x11-server-source-1.20.3-150400.38.48.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150400.38.48.1.i586",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150400.38.48.1.i586",
                  "product_id": "xorg-x11-server-1.20.3-150400.38.48.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.i586",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.i586",
                  "product_id": "xorg-x11-server-extra-1.20.3-150400.38.48.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.i586",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.i586",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.i586",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.i586",
                  "product_id": "xorg-x11-server-source-1.20.3-150400.38.48.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
                  "product_id": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
                  "product_id": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.ppc64le",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.ppc64le",
                  "product_id": "xorg-x11-server-source-1.20.3-150400.38.48.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150400.38.48.1.s390x",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150400.38.48.1.s390x",
                  "product_id": "xorg-x11-server-1.20.3-150400.38.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
                  "product_id": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.s390x",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.s390x",
                  "product_id": "xorg-x11-server-source-1.20.3-150400.38.48.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
                  "product_id": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
                  "product_id": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
                  "product_id": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.x86_64",
                "product": {
                  "name": "xorg-x11-server-source-1.20.3-150400.38.48.1.x86_64",
                  "product_id": "xorg-x11-server-source-1.20.3-150400.38.48.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:15:sp4"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Proxy 4.3",
                "product": {
                  "name": "SUSE Manager Proxy 4.3",
                  "product_id": "SUSE Manager Proxy 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Manager Server 4.3",
                "product": {
                  "name": "SUSE Manager Server 4.3",
                  "product_id": "SUSE Manager Server 4.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:suse-manager-server:4.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
          "product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Manager Proxy 4.3",
          "product_id": "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Proxy 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64 as component of SUSE Manager Server 4.3",
          "product_id": "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        },
        "product_reference": "xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
        "relates_to_product_reference": "SUSE Manager Server 4.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:04:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:04:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31082"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcAppleDRICreatePixmap() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31082",
          "url": "https://www.suse.com/security/cve/CVE-2024-31082"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222311 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222311"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31082",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:04:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
          "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
          "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.aarch64",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.s390x",
            "SUSE Linux Enterprise Server 15 SP4-LTSS:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 15 SP4:xorg-x11-server-sdk-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Proxy 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-1.20.3-150400.38.48.1.x86_64",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.ppc64le",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.s390x",
            "SUSE Manager Server 4.3:xorg-x11-server-extra-1.20.3-150400.38.48.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:04:14Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  suse-su-2024:1264-1
Vulnerability from csaf_suse
Notes
{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xwayland",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xwayland fixes the following issues:\n\n- CVE-2024-31080: Fixed ProcXIGetSelectedEvents to use unswapped length (bsc#1222309).\n- CVE-2024-31081: Fixed ProcXIPassiveGrabDevice to use unswapped length to send reply (bsc#1222310).\n- CVE-2024-31083: Fixed refcounting of glyphs during ProcRenderAddGlyphs (bsc#1222312).\n\nOther fixes:\n- Fixed regression for security fix for CVE-2024-31083 when using Android Studio (bnc#1222442)\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2024-1264,SUSE-SLE-Product-WE-15-SP5-2024-1264,openSUSE-SLE-15.5-2024-1264",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_1264-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2024:1264-1",
        "url": "https://www.suse.com/support/update/announcement/2024/suse-su-20241264-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2024:1264-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2024-April/034959.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222309",
        "url": "https://bugzilla.suse.com/1222309"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222310",
        "url": "https://bugzilla.suse.com/1222310"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222312",
        "url": "https://bugzilla.suse.com/1222312"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1222442",
        "url": "https://bugzilla.suse.com/1222442"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31080 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31080/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31081 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31081/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-31083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-31083/"
      }
    ],
    "title": "Security update for xwayland",
    "tracking": {
      "current_release_date": "2024-04-12T13:06:00Z",
      "generator": {
        "date": "2024-04-12T13:06:00Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2024:1264-1",
      "initial_release_date": "2024-04-12T13:06:00Z",
      "revision_history": [
        {
          "date": "2024-04-12T13:06:00Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-22.1.5-150500.7.22.1.aarch64",
                "product": {
                  "name": "xwayland-22.1.5-150500.7.22.1.aarch64",
                  "product_id": "xwayland-22.1.5-150500.7.22.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-22.1.5-150500.7.22.1.aarch64",
                "product": {
                  "name": "xwayland-devel-22.1.5-150500.7.22.1.aarch64",
                  "product_id": "xwayland-devel-22.1.5-150500.7.22.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-22.1.5-150500.7.22.1.i586",
                "product": {
                  "name": "xwayland-22.1.5-150500.7.22.1.i586",
                  "product_id": "xwayland-22.1.5-150500.7.22.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-22.1.5-150500.7.22.1.i586",
                "product": {
                  "name": "xwayland-devel-22.1.5-150500.7.22.1.i586",
                  "product_id": "xwayland-devel-22.1.5-150500.7.22.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-22.1.5-150500.7.22.1.ppc64le",
                "product": {
                  "name": "xwayland-22.1.5-150500.7.22.1.ppc64le",
                  "product_id": "xwayland-22.1.5-150500.7.22.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
                "product": {
                  "name": "xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
                  "product_id": "xwayland-devel-22.1.5-150500.7.22.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-22.1.5-150500.7.22.1.s390x",
                "product": {
                  "name": "xwayland-22.1.5-150500.7.22.1.s390x",
                  "product_id": "xwayland-22.1.5-150500.7.22.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-22.1.5-150500.7.22.1.s390x",
                "product": {
                  "name": "xwayland-devel-22.1.5-150500.7.22.1.s390x",
                  "product_id": "xwayland-devel-22.1.5-150500.7.22.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xwayland-22.1.5-150500.7.22.1.x86_64",
                "product": {
                  "name": "xwayland-22.1.5-150500.7.22.1.x86_64",
                  "product_id": "xwayland-22.1.5-150500.7.22.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "xwayland-devel-22.1.5-150500.7.22.1.x86_64",
                "product": {
                  "name": "xwayland-devel-22.1.5-150500.7.22.1.x86_64",
                  "product_id": "xwayland-devel-22.1.5-150500.7.22.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:15:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.5",
                "product": {
                  "name": "openSUSE Leap 15.5",
                  "product_id": "openSUSE Leap 15.5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-22.1.5-150500.7.22.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 15 SP5",
          "product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64"
        },
        "product_reference": "xwayland-22.1.5-150500.7.22.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 15 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-22.1.5-150500.7.22.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64"
        },
        "product_reference": "xwayland-22.1.5-150500.7.22.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-22.1.5-150500.7.22.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le"
        },
        "product_reference": "xwayland-22.1.5-150500.7.22.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-22.1.5-150500.7.22.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x"
        },
        "product_reference": "xwayland-22.1.5-150500.7.22.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-22.1.5-150500.7.22.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64"
        },
        "product_reference": "xwayland-22.1.5-150500.7.22.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-22.1.5-150500.7.22.1.aarch64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64"
        },
        "product_reference": "xwayland-devel-22.1.5-150500.7.22.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-22.1.5-150500.7.22.1.ppc64le as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le"
        },
        "product_reference": "xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-22.1.5-150500.7.22.1.s390x as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x"
        },
        "product_reference": "xwayland-devel-22.1.5-150500.7.22.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xwayland-devel-22.1.5-150500.7.22.1.x86_64 as component of openSUSE Leap 15.5",
          "product_id": "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
        },
        "product_reference": "xwayland-devel-22.1.5-150500.7.22.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31080"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31080",
          "url": "https://www.suse.com/security/cve/CVE-2024-31080"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222309 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222309"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31080",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:06:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31081"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIPassiveGrabDevice() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31081",
          "url": "https://www.suse.com/security/cve/CVE-2024-31081"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222310 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222310"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31081",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:06:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-31083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in the ProcRenderAddGlyphs() function of Xorg servers. This issue occurs when AllocateGlyph() is called to store new glyphs sent by the client to the X server, potentially resulting in multiple entries pointing to the same non-refcounted glyphs. Consequently, ProcRenderAddGlyphs() may free a glyph, leading to a use-after-free scenario when the same glyph pointer is subsequently accessed. This flaw allows an authenticated attacker to execute arbitrary code on the system by sending a specially crafted request.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
          "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-31083",
          "url": "https://www.suse.com/security/cve/CVE-2024-31083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222312 for CVE-2024-31083",
          "url": "https://bugzilla.suse.com/1222312"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Workstation Extension 15 SP5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-22.1.5-150500.7.22.1.x86_64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.aarch64",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.ppc64le",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.s390x",
            "openSUSE Leap 15.5:xwayland-devel-22.1.5-150500.7.22.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2024-04-12T13:06:00Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-31083"
    }
  ]
}
  wid-sec-w-2024-0778
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.\r\nXming ist ein X-Server f\u00fcr Windows mit grafischem Interface.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im X.Org X Server und in Xming ausnutzen, um vertrauliche Informationen offenzulegen und potenziell einen Denial-of-Service-Zustand auszul\u00f6sen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- MacOS X\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0778 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0778.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0778 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0778"
      },
      {
        "category": "external",
        "summary": "X.Org Security Advisory vom 2024-04-03",
        "url": "https://seclists.org/oss-sec/2024/q2/22"
      },
      {
        "category": "external",
        "summary": "Xming Changes vom 2024-04-03",
        "url": "http://www.straightrunning.com/XmingNotes/changes.php"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory vom 2024-04-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-852d7faa63"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory vom 2024-04-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-a1d440af5c"
      },
      {
        "category": "external",
        "summary": "[ANNOUNCE] xorg-server 21.1.12",
        "url": "https://lists.x.org/archives/xorg-announce/2024-April/003499.html"
      },
      {
        "category": "external",
        "summary": "X.Org Security Advisory",
        "url": "https://lists.x.org/archives/xorg-announce/2024-April/003497.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-DD905788C4 vom 2024-04-04",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-dd905788c4"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-77FD3B2F2A vom 2024-04-04",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-77fd3b2f2a"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.3 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata73.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.4 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata74.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.5 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata75.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6721-1 vom 2024-04-04",
        "url": "https://ubuntu.com/security/notices/USN-6721-1"
      },
      {
        "category": "external",
        "summary": "OpenBSD 7.4 Errata",
        "url": "https://www.openbsd.org/errata74.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD 7.3 Errata",
        "url": "https://www.openbsd.org/errata73.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-01A9916E9E vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-01a9916e9e"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-1706127797 vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1706127797"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-5AF98298C7 vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5af98298c7"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6721-2 vom 2024-04-09",
        "url": "https://www.cybersecurity-help.cz/vdb/SB2024041011"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1199-1 vom 2024-04-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018317.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1785 vom 2024-04-12",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1785.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1785 vom 2024-04-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:1785"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1264-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018340.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1265-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018339.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1260-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018344.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5657 vom 2024-04-12",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00065.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1261-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018343.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1262-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018342.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1263-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018341.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3787 vom 2024-04-15",
        "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1928 vom 2024-04-16",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1928.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1927 vom 2024-04-16",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1927.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2510 vom 2024-04-18",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2510.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2036 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2036"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2041 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2041"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2042 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2042"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2040 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2040"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2039 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2039"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25",
        "url": "http://linux.oracle.com/errata/ELSA-2024-2037.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2038 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2038"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2037 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2080 vom 2024-04-29",
        "url": "http://access.redhat.com/errata/RHSA-2024:2080"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2080.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2616 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2616"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:2037 vom 2024-05-06",
        "url": "https://errata.build.resf.org/RLSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2616 vom 2024-05-07",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2616.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3258 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3258"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3261 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3261"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3343 vom 2024-05-23",
        "url": "https://access.redhat.com/errata/RHSA-2024:3343"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3343 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3343.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3261 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3261.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3258 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3258.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2024:1785 vom 2024-06-06",
        "url": "https://lwn.net/Articles/973024"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2024:2080 vom 2024-06-06",
        "url": "https://lwn.net/Articles/973023"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2511 vom 2024-06-28",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2511.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:2776-1 vom 2024-08-19",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9093 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9122 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9122"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202411-08 vom 2024-11-17",
        "url": "https://security.gentoo.org/glsa/202411-08"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-2861 vom 2025-04-01",
        "url": "https://linux.oracle.com/errata/ELSA-2025-2861.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12751 vom 2025-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2025:12751"
      }
    ],
    "source_lang": "en-US",
    "title": "X.Org X Server und Xming: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:19:32.152+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-0778",
      "initial_release_date": "2024-04-03T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-04-03T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-04-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-04-07T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2024-04-09T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-04-10T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-11T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2024-04-14T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE und Debian aufgenommen"
        },
        {
          "date": "2024-04-15T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-04-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-04-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-04-24T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-06T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2024-05-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-23T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-06-05T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-08-18T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-17T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2025-01-12T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von XEROX aufgenommen"
        },
        {
          "date": "2025-03-31T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "26"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c21.1.12",
                "product": {
                  "name": "Open Source X.Org X11 \u003c21.1.12",
                  "product_id": "T033892"
                }
              },
              {
                "category": "product_version",
                "name": "21.1.12",
                "product": {
                  "name": "Open Source X.Org X11 21.1.12",
                  "product_id": "T033892-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:x:x.org_x11:21.1.12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "X.Org X11"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.7.1.2",
                "product": {
                  "name": "Open Source Xming \u003c7.7.1.2",
                  "product_id": "T033891"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.1.2",
                "product": {
                  "name": "Open Source Xming 7.7.1.2",
                  "product_id": "T033891-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:open_source:xming:7.7.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Xming"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "OpenBSD OpenBSD 7.3",
                  "product_id": "T027887",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "OpenBSD OpenBSD 7.3",
                  "product_id": "T030010",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.4",
                "product": {
                  "name": "OpenBSD OpenBSD 7.4",
                  "product_id": "T030792",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.4",
                "product": {
                  "name": "OpenBSD OpenBSD 7.4",
                  "product_id": "T033213",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.5",
                "product": {
                  "name": "OpenBSD OpenBSD 7.5",
                  "product_id": "T033898",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenBSD"
          }
        ],
        "category": "vendor",
        "name": "OpenBSD"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "v9 for Solaris",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9 for Solaris",
                  "product_id": "T028053",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31083"
    }
  ]
}
  wid-sec-w-2024-3195
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3195 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3195 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195"
      },
      {
        "category": "external",
        "summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15",
        "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU"
      }
    ],
    "source_lang": "en-US",
    "title": "Oracle Communications: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-10-15T22:00:00.000+00:00",
      "generator": {
        "date": "2024-10-16T10:12:35.400+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-3195",
      "initial_release_date": "2024-10-15T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-10-15T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "9.1.1.3.0",
                "product": {
                  "name": "Oracle Communications 9.1.1.3.0",
                  "product_id": "T027333",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.1.3.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "12.6.1.0.0",
                "product": {
                  "name": "Oracle Communications 12.6.1.0.0",
                  "product_id": "T027338",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:12.6.1.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "5.1",
                "product": {
                  "name": "Oracle Communications 5.1",
                  "product_id": "T028684",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:5.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "15.0.0.0.0",
                "product": {
                  "name": "Oracle Communications 15.0.0.0.0",
                  "product_id": "T032090",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.0",
                "product": {
                  "name": "Oracle Communications 23.4.0",
                  "product_id": "T032091",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.2",
                "product": {
                  "name": "Oracle Communications 23.4.2",
                  "product_id": "T034144",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.1.0",
                "product": {
                  "name": "Oracle Communications 24.1.0",
                  "product_id": "T034145",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "5.2",
                "product": {
                  "name": "Oracle Communications 5.2",
                  "product_id": "T034146",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:5.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.1.0.0.0",
                "product": {
                  "name": "Oracle Communications 24.1.0.0.0",
                  "product_id": "T034147",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.0.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.3",
                "product": {
                  "name": "Oracle Communications 23.4.3",
                  "product_id": "T036195",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.4",
                "product": {
                  "name": "Oracle Communications 23.4.4",
                  "product_id": "T036196",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=24.2.0",
                "product": {
                  "name": "Oracle Communications \u003c=24.2.0",
                  "product_id": "T036197"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=24.2.0",
                "product": {
                  "name": "Oracle Communications \u003c=24.2.0",
                  "product_id": "T036197-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "4.1.0",
                "product": {
                  "name": "Oracle Communications 4.1.0",
                  "product_id": "T036205",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:4.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "4.2.0",
                "product": {
                  "name": "Oracle Communications 4.2.0",
                  "product_id": "T036206",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:4.2.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.2.0",
                "product": {
                  "name": "Oracle Communications 9.2.0",
                  "product_id": "T036207",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.2.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.3.0",
                "product": {
                  "name": "Oracle Communications 9.3.0",
                  "product_id": "T036208",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.3.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "12.11.0",
                "product": {
                  "name": "Oracle Communications 12.11.0",
                  "product_id": "T036209",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:12.11.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.0.1.10.0",
                "product": {
                  "name": "Oracle Communications 9.0.1.10.0",
                  "product_id": "T038373",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.0.1.10.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.5",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.5",
                  "product_id": "T038375"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.5",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.5",
                  "product_id": "T038375-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "24.2.1",
                "product": {
                  "name": "Oracle Communications 24.2.1",
                  "product_id": "T038376",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.2.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.6",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.6",
                  "product_id": "T038377"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.6",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.6",
                  "product_id": "T038377-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "24.1.1",
                "product": {
                  "name": "Oracle Communications 24.1.1",
                  "product_id": "T038378",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.2.2",
                "product": {
                  "name": "Oracle Communications 24.2.2",
                  "product_id": "T038379",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.2.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.5",
                "product": {
                  "name": "Oracle Communications 9.1.5",
                  "product_id": "T038380",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.0",
                "product": {
                  "name": "Oracle Communications 9.1.0",
                  "product_id": "T038381",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "14",
                "product": {
                  "name": "Oracle Communications 14.0",
                  "product_id": "T038382",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:14.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.1.9.0",
                "product": {
                  "name": "Oracle Communications 9.1.1.9.0",
                  "product_id": "T038383",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.1.9.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "14.0.0.1",
                "product": {
                  "name": "Oracle Communications 14.0.0.1",
                  "product_id": "T038384",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:14.0.0.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "17.0.1",
                "product": {
                  "name": "Oracle Communications 17.0.1",
                  "product_id": "T038385",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:17.0.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.4.0.4",
                "product": {
                  "name": "Oracle Communications \u003c10.4.0.4",
                  "product_id": "T038386"
                }
              },
              {
                "category": "product_version",
                "name": "10.4.0.4",
                "product": {
                  "name": "Oracle Communications 10.4.0.4",
                  "product_id": "T038386-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:10.4.0.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=9.1.1.8.0",
                "product": {
                  "name": "Oracle Communications \u003c=9.1.1.8.0",
                  "product_id": "T038426"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=9.1.1.8.0",
                "product": {
                  "name": "Oracle Communications \u003c=9.1.1.8.0",
                  "product_id": "T038426-fixed"
                }
              }
            ],
            "category": "product_name",
            "name": "Communications"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2068",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-23437",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-23437"
    },
    {
      "cve": "CVE-2022-2601",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2023-2953",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3635",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-3635"
    },
    {
      "cve": "CVE-2023-38408",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-4043",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-4043"
    },
    {
      "cve": "CVE-2023-46136",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-48795",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51775",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-51775"
    },
    {
      "cve": "CVE-2023-5685",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-6597",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6816",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-6816"
    },
    {
      "cve": "CVE-2024-0450",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-22020",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22020"
    },
    {
      "cve": "CVE-2024-22257",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22257"
    },
    {
      "cve": "CVE-2024-22262",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22262"
    },
    {
      "cve": "CVE-2024-23672",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-2398",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-25062",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-25638",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-26308",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-26308"
    },
    {
      "cve": "CVE-2024-28182",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28849",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-28849"
    },
    {
      "cve": "CVE-2024-29025",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29736",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29736"
    },
    {
      "cve": "CVE-2024-29857",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29857"
    },
    {
      "cve": "CVE-2024-30251",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-30251"
    },
    {
      "cve": "CVE-2024-31080",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31744",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-31744"
    },
    {
      "cve": "CVE-2024-32760",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-32760"
    },
    {
      "cve": "CVE-2024-33602",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34750",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-34750"
    },
    {
      "cve": "CVE-2024-37371",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38816",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-38816"
    },
    {
      "cve": "CVE-2024-40898",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-43044",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-45492",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-4577",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-4577"
    },
    {
      "cve": "CVE-2024-4603",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-5971",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-5971"
    },
    {
      "cve": "CVE-2024-6162",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-6162"
    },
    {
      "cve": "CVE-2024-6387",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-7254",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-7254"
    }
  ]
}
  WID-SEC-W-2024-0778
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "mittel"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Das X Window System dient der Erzeugung grafischer Oberfl\u00e4chen auf Unix Systemen.\r\nXming ist ein X-Server f\u00fcr Windows mit grafischem Interface.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen im X.Org X Server und in Xming ausnutzen, um vertrauliche Informationen offenzulegen und potenziell einen Denial-of-Service-Zustand auszul\u00f6sen.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Linux\n- MacOS X\n- UNIX\n- Windows",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-0778 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0778.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-0778 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0778"
      },
      {
        "category": "external",
        "summary": "X.Org Security Advisory vom 2024-04-03",
        "url": "https://seclists.org/oss-sec/2024/q2/22"
      },
      {
        "category": "external",
        "summary": "Xming Changes vom 2024-04-03",
        "url": "http://www.straightrunning.com/XmingNotes/changes.php"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory vom 2024-04-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-852d7faa63"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory vom 2024-04-03",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-a1d440af5c"
      },
      {
        "category": "external",
        "summary": "[ANNOUNCE] xorg-server 21.1.12",
        "url": "https://lists.x.org/archives/xorg-announce/2024-April/003499.html"
      },
      {
        "category": "external",
        "summary": "X.Org Security Advisory",
        "url": "https://lists.x.org/archives/xorg-announce/2024-April/003497.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-DD905788C4 vom 2024-04-04",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-dd905788c4"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-77FD3B2F2A vom 2024-04-04",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-77fd3b2f2a"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.3 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata73.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.4 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata74.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD Errata 7.5 vom 2024-04-04",
        "url": "https://www.openbsd.org/errata75.html"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6721-1 vom 2024-04-04",
        "url": "https://ubuntu.com/security/notices/USN-6721-1"
      },
      {
        "category": "external",
        "summary": "OpenBSD 7.4 Errata",
        "url": "https://www.openbsd.org/errata74.html"
      },
      {
        "category": "external",
        "summary": "OpenBSD 7.3 Errata",
        "url": "https://www.openbsd.org/errata73.html"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-01A9916E9E vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-01a9916e9e"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-1706127797 vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-1706127797"
      },
      {
        "category": "external",
        "summary": "Fedora Security Advisory FEDORA-2024-5AF98298C7 vom 2024-04-09",
        "url": "https://bodhi.fedoraproject.org/updates/FEDORA-2024-5af98298c7"
      },
      {
        "category": "external",
        "summary": "Ubuntu Security Notice USN-6721-2 vom 2024-04-09",
        "url": "https://www.cybersecurity-help.cz/vdb/SB2024041011"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1199-1 vom 2024-04-10",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018317.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-1785 vom 2024-04-12",
        "url": "https://linux.oracle.com/errata/ELSA-2024-1785.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:1785 vom 2024-04-11",
        "url": "https://access.redhat.com/errata/RHSA-2024:1785"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1264-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018340.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1265-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018339.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1260-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018344.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DSA-5657 vom 2024-04-12",
        "url": "https://lists.debian.org/debian-security-announce/2024/msg00065.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1261-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018343.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1262-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018342.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:1263-1 vom 2024-04-12",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-April/018341.html"
      },
      {
        "category": "external",
        "summary": "Debian Security Advisory DLA-3787 vom 2024-04-15",
        "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1928 vom 2024-04-16",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1928.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-1927 vom 2024-04-16",
        "url": "https://alas.aws.amazon.com/ALAS-2024-1927.html"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2510 vom 2024-04-18",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2510.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2036 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2036"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2041 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2041"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2042 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2042"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2040 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2040"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2039 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2039"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2037 vom 2024-04-25",
        "url": "http://linux.oracle.com/errata/ELSA-2024-2037.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2038 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2038"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2037 vom 2024-04-24",
        "url": "https://access.redhat.com/errata/RHSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2080 vom 2024-04-29",
        "url": "http://access.redhat.com/errata/RHSA-2024:2080"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2080 vom 2024-04-30",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2080.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:2616 vom 2024-04-30",
        "url": "https://access.redhat.com/errata/RHSA-2024:2616"
      },
      {
        "category": "external",
        "summary": "Rocky Linux Security Advisory RLSA-2024:2037 vom 2024-05-06",
        "url": "https://errata.build.resf.org/RLSA-2024:2037"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-2616 vom 2024-05-07",
        "url": "https://linux.oracle.com/errata/ELSA-2024-2616.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3258 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3258"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3261 vom 2024-05-22",
        "url": "https://access.redhat.com/errata/RHSA-2024:3261"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:3343 vom 2024-05-23",
        "url": "https://access.redhat.com/errata/RHSA-2024:3343"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3343 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3343.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3261 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3261.html"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2024-3258 vom 2024-05-30",
        "url": "http://linux.oracle.com/errata/ELSA-2024-3258.html"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2024:1785 vom 2024-06-06",
        "url": "https://lwn.net/Articles/973024"
      },
      {
        "category": "external",
        "summary": "CentOS Security Advisory CESA-2024:2080 vom 2024-06-06",
        "url": "https://lwn.net/Articles/973023"
      },
      {
        "category": "external",
        "summary": "Amazon Linux Security Advisory ALAS-2024-2511 vom 2024-06-28",
        "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2511.html"
      },
      {
        "category": "external",
        "summary": "SUSE Security Update SUSE-SU-2024:2776-1 vom 2024-08-19",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-August/019222.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9093 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9093"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2024:9122 vom 2024-11-12",
        "url": "https://access.redhat.com/errata/RHSA-2024:9122"
      },
      {
        "category": "external",
        "summary": "Gentoo Linux Security Advisory GLSA-202411-08 vom 2024-11-17",
        "url": "https://security.gentoo.org/glsa/202411-08"
      },
      {
        "category": "external",
        "summary": "XEROX Security Advisory XRX25-001 vom 2025-01-13",
        "url": "https://securitydocs.business.xerox.com/wp-content/uploads/2025/01/Xerox-Security-Bulletin-XRX25-001-for-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
      },
      {
        "category": "external",
        "summary": "Oracle Linux Security Advisory ELSA-2025-2861 vom 2025-04-01",
        "url": "https://linux.oracle.com/errata/ELSA-2025-2861.html"
      },
      {
        "category": "external",
        "summary": "Red Hat Security Advisory RHSA-2025:12751 vom 2025-08-04",
        "url": "https://access.redhat.com/errata/RHSA-2025:12751"
      }
    ],
    "source_lang": "en-US",
    "title": "X.Org X Server und Xming: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2025-08-04T22:00:00.000+00:00",
      "generator": {
        "date": "2025-08-05T07:19:32.152+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.4.0"
        }
      },
      "id": "WID-SEC-W-2024-0778",
      "initial_release_date": "2024-04-03T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-04-03T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        },
        {
          "date": "2024-04-04T22:00:00.000+00:00",
          "number": "2",
          "summary": "Neue Updates von Ubuntu aufgenommen"
        },
        {
          "date": "2024-04-07T22:00:00.000+00:00",
          "number": "3",
          "summary": "Neue Updates aufgenommen"
        },
        {
          "date": "2024-04-09T22:00:00.000+00:00",
          "number": "4",
          "summary": "Neue Updates von Fedora aufgenommen"
        },
        {
          "date": "2024-04-10T22:00:00.000+00:00",
          "number": "5",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-04-11T22:00:00.000+00:00",
          "number": "6",
          "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
        },
        {
          "date": "2024-04-14T22:00:00.000+00:00",
          "number": "7",
          "summary": "Neue Updates von SUSE und Debian aufgenommen"
        },
        {
          "date": "2024-04-15T22:00:00.000+00:00",
          "number": "8",
          "summary": "Neue Updates von Debian aufgenommen"
        },
        {
          "date": "2024-04-16T22:00:00.000+00:00",
          "number": "9",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-04-17T22:00:00.000+00:00",
          "number": "10",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-04-24T22:00:00.000+00:00",
          "number": "11",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-04-29T22:00:00.000+00:00",
          "number": "12",
          "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-01T22:00:00.000+00:00",
          "number": "13",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-06T22:00:00.000+00:00",
          "number": "14",
          "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
        },
        {
          "date": "2024-05-07T22:00:00.000+00:00",
          "number": "15",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-05-21T22:00:00.000+00:00",
          "number": "16",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-23T22:00:00.000+00:00",
          "number": "17",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-05-30T22:00:00.000+00:00",
          "number": "18",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2024-06-05T22:00:00.000+00:00",
          "number": "19",
          "summary": "Neue Updates von CentOS aufgenommen"
        },
        {
          "date": "2024-06-30T22:00:00.000+00:00",
          "number": "20",
          "summary": "Neue Updates von Amazon aufgenommen"
        },
        {
          "date": "2024-08-18T22:00:00.000+00:00",
          "number": "21",
          "summary": "Neue Updates von SUSE aufgenommen"
        },
        {
          "date": "2024-11-11T23:00:00.000+00:00",
          "number": "22",
          "summary": "Neue Updates von Red Hat aufgenommen"
        },
        {
          "date": "2024-11-17T23:00:00.000+00:00",
          "number": "23",
          "summary": "Neue Updates von Gentoo aufgenommen"
        },
        {
          "date": "2025-01-12T23:00:00.000+00:00",
          "number": "24",
          "summary": "Neue Updates von XEROX aufgenommen"
        },
        {
          "date": "2025-03-31T22:00:00.000+00:00",
          "number": "25",
          "summary": "Neue Updates von Oracle Linux aufgenommen"
        },
        {
          "date": "2025-08-04T22:00:00.000+00:00",
          "number": "26",
          "summary": "Neue Updates von Red Hat aufgenommen"
        }
      ],
      "status": "final",
      "version": "26"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Amazon Linux 2",
            "product": {
              "name": "Amazon Linux 2",
              "product_id": "398363",
              "product_identification_helper": {
                "cpe": "cpe:/o:amazon:linux_2:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Amazon"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Debian Linux",
            "product": {
              "name": "Debian Linux",
              "product_id": "2951",
              "product_identification_helper": {
                "cpe": "cpe:/o:debian:debian_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Debian"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Fedora Linux",
            "product": {
              "name": "Fedora Linux",
              "product_id": "74185",
              "product_identification_helper": {
                "cpe": "cpe:/o:fedoraproject:fedora:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Fedora"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Gentoo Linux",
            "product": {
              "name": "Gentoo Linux",
              "product_id": "T012167",
              "product_identification_helper": {
                "cpe": "cpe:/o:gentoo:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Gentoo"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Open Source CentOS",
            "product": {
              "name": "Open Source CentOS",
              "product_id": "1727",
              "product_identification_helper": {
                "cpe": "cpe:/o:centos:centos:-"
              }
            }
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c21.1.12",
                "product": {
                  "name": "Open Source X.Org X11 \u003c21.1.12",
                  "product_id": "T033892"
                }
              },
              {
                "category": "product_version",
                "name": "21.1.12",
                "product": {
                  "name": "Open Source X.Org X11 21.1.12",
                  "product_id": "T033892-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:x:x.org_x11:21.1.12"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "X.Org X11"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003c7.7.1.2",
                "product": {
                  "name": "Open Source Xming \u003c7.7.1.2",
                  "product_id": "T033891"
                }
              },
              {
                "category": "product_version",
                "name": "7.7.1.2",
                "product": {
                  "name": "Open Source Xming 7.7.1.2",
                  "product_id": "T033891-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:open_source:xming:7.7.1.2"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "Xming"
          }
        ],
        "category": "vendor",
        "name": "Open Source"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "OpenBSD OpenBSD 7.3",
                  "product_id": "T027887",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.3",
                "product": {
                  "name": "OpenBSD OpenBSD 7.3",
                  "product_id": "T030010",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.4",
                "product": {
                  "name": "OpenBSD OpenBSD 7.4",
                  "product_id": "T030792",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.4",
                "product": {
                  "name": "OpenBSD OpenBSD 7.4",
                  "product_id": "T033213",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.4"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "7.5",
                "product": {
                  "name": "OpenBSD OpenBSD 7.5",
                  "product_id": "T033898",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:openbsd:openbsd:7.5"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "OpenBSD"
          }
        ],
        "category": "vendor",
        "name": "OpenBSD"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Oracle Linux",
            "product": {
              "name": "Oracle Linux",
              "product_id": "T004914",
              "product_identification_helper": {
                "cpe": "cpe:/o:oracle:linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "RESF Rocky Linux",
            "product": {
              "name": "RESF Rocky Linux",
              "product_id": "T032255",
              "product_identification_helper": {
                "cpe": "cpe:/o:resf:rocky_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "RESF"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Red Hat Enterprise Linux",
            "product": {
              "name": "Red Hat Enterprise Linux",
              "product_id": "67646",
              "product_identification_helper": {
                "cpe": "cpe:/o:redhat:enterprise_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "SUSE Linux",
            "product": {
              "name": "SUSE Linux",
              "product_id": "T002207",
              "product_identification_helper": {
                "cpe": "cpe:/o:suse:suse_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      },
      {
        "branches": [
          {
            "category": "product_name",
            "name": "Ubuntu Linux",
            "product": {
              "name": "Ubuntu Linux",
              "product_id": "T000126",
              "product_identification_helper": {
                "cpe": "cpe:/o:canonical:ubuntu_linux:-"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "Ubuntu"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "v9 for Solaris",
                "product": {
                  "name": "Xerox FreeFlow Print Server v9 for Solaris",
                  "product_id": "T028053",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:xerox:freeflow_print_server:v9_for_solaris"
                  }
                }
              }
            ],
            "category": "product_name",
            "name": "FreeFlow Print Server"
          }
        ],
        "category": "vendor",
        "name": "Xerox"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31081",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31081"
    },
    {
      "cve": "CVE-2024-31082",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31082"
    },
    {
      "cve": "CVE-2024-31083",
      "product_status": {
        "known_affected": [
          "T033898",
          "T028053",
          "T033213",
          "67646",
          "T012167",
          "T004914",
          "T032255",
          "74185",
          "T030792",
          "T033891",
          "T030010",
          "T033892",
          "2951",
          "T002207",
          "T000126",
          "T027887",
          "398363",
          "1727"
        ]
      },
      "release_date": "2024-04-03T22:00:00.000+00:00",
      "title": "CVE-2024-31083"
    }
  ]
}
  WID-SEC-W-2024-3195
Vulnerability from csaf_certbund
Notes
{
  "document": {
    "aggregate_severity": {
      "text": "hoch"
    },
    "category": "csaf_base",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "de-DE",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
      },
      {
        "category": "description",
        "text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
        "title": "Produktbeschreibung"
      },
      {
        "category": "summary",
        "text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
        "title": "Angriff"
      },
      {
        "category": "general",
        "text": "- Sonstiges",
        "title": "Betroffene Betriebssysteme"
      }
    ],
    "publisher": {
      "category": "other",
      "contact_details": "csaf-provider@cert-bund.de",
      "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
      "namespace": "https://www.bsi.bund.de"
    },
    "references": [
      {
        "category": "self",
        "summary": "WID-SEC-W-2024-3195 - CSAF Version",
        "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3195.json"
      },
      {
        "category": "self",
        "summary": "WID-SEC-2024-3195 - Portal Version",
        "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3195"
      },
      {
        "category": "external",
        "summary": "Oracle Critical Patch Update Advisory - October 2024 - Appendix Oracle Communications vom 2024-10-15",
        "url": "https://www.oracle.com/security-alerts/cpuoct2024.html#AppendixCGBU"
      }
    ],
    "source_lang": "en-US",
    "title": "Oracle Communications: Mehrere Schwachstellen",
    "tracking": {
      "current_release_date": "2024-10-15T22:00:00.000+00:00",
      "generator": {
        "date": "2024-10-16T10:12:35.400+00:00",
        "engine": {
          "name": "BSI-WID",
          "version": "1.3.8"
        }
      },
      "id": "WID-SEC-W-2024-3195",
      "initial_release_date": "2024-10-15T22:00:00.000+00:00",
      "revision_history": [
        {
          "date": "2024-10-15T22:00:00.000+00:00",
          "number": "1",
          "summary": "Initiale Fassung"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "9.1.1.3.0",
                "product": {
                  "name": "Oracle Communications 9.1.1.3.0",
                  "product_id": "T027333",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.1.3.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "12.6.1.0.0",
                "product": {
                  "name": "Oracle Communications 12.6.1.0.0",
                  "product_id": "T027338",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:12.6.1.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "5.1",
                "product": {
                  "name": "Oracle Communications 5.1",
                  "product_id": "T028684",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:5.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "15.0.0.0.0",
                "product": {
                  "name": "Oracle Communications 15.0.0.0.0",
                  "product_id": "T032090",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.0",
                "product": {
                  "name": "Oracle Communications 23.4.0",
                  "product_id": "T032091",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.2",
                "product": {
                  "name": "Oracle Communications 23.4.2",
                  "product_id": "T034144",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.1.0",
                "product": {
                  "name": "Oracle Communications 24.1.0",
                  "product_id": "T034145",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "5.2",
                "product": {
                  "name": "Oracle Communications 5.2",
                  "product_id": "T034146",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:5.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.1.0.0.0",
                "product": {
                  "name": "Oracle Communications 24.1.0.0.0",
                  "product_id": "T034147",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.0.0.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.3",
                "product": {
                  "name": "Oracle Communications 23.4.3",
                  "product_id": "T036195",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.3"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "23.4.4",
                "product": {
                  "name": "Oracle Communications 23.4.4",
                  "product_id": "T036196",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:23.4.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=24.2.0",
                "product": {
                  "name": "Oracle Communications \u003c=24.2.0",
                  "product_id": "T036197"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=24.2.0",
                "product": {
                  "name": "Oracle Communications \u003c=24.2.0",
                  "product_id": "T036197-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "4.1.0",
                "product": {
                  "name": "Oracle Communications 4.1.0",
                  "product_id": "T036205",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:4.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "4.2.0",
                "product": {
                  "name": "Oracle Communications 4.2.0",
                  "product_id": "T036206",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:4.2.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.2.0",
                "product": {
                  "name": "Oracle Communications 9.2.0",
                  "product_id": "T036207",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.2.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.3.0",
                "product": {
                  "name": "Oracle Communications 9.3.0",
                  "product_id": "T036208",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.3.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "12.11.0",
                "product": {
                  "name": "Oracle Communications 12.11.0",
                  "product_id": "T036209",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:12.11.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.0.1.10.0",
                "product": {
                  "name": "Oracle Communications 9.0.1.10.0",
                  "product_id": "T038373",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.0.1.10.0"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.5",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.5",
                  "product_id": "T038375"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.5",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.5",
                  "product_id": "T038375-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "24.2.1",
                "product": {
                  "name": "Oracle Communications 24.2.1",
                  "product_id": "T038376",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.2.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.6",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.6",
                  "product_id": "T038377"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=23.4.6",
                "product": {
                  "name": "Oracle Communications \u003c=23.4.6",
                  "product_id": "T038377-fixed"
                }
              },
              {
                "category": "product_version",
                "name": "24.1.1",
                "product": {
                  "name": "Oracle Communications 24.1.1",
                  "product_id": "T038378",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.1.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "24.2.2",
                "product": {
                  "name": "Oracle Communications 24.2.2",
                  "product_id": "T038379",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:24.2.2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.5",
                "product": {
                  "name": "Oracle Communications 9.1.5",
                  "product_id": "T038380",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.5"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.0",
                "product": {
                  "name": "Oracle Communications 9.1.0",
                  "product_id": "T038381",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "14",
                "product": {
                  "name": "Oracle Communications 14.0",
                  "product_id": "T038382",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:14.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "9.1.1.9.0",
                "product": {
                  "name": "Oracle Communications 9.1.1.9.0",
                  "product_id": "T038383",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:9.1.1.9.0"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "14.0.0.1",
                "product": {
                  "name": "Oracle Communications 14.0.0.1",
                  "product_id": "T038384",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:14.0.0.1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "17.0.1",
                "product": {
                  "name": "Oracle Communications 17.0.1",
                  "product_id": "T038385",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:17.0.1"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c10.4.0.4",
                "product": {
                  "name": "Oracle Communications \u003c10.4.0.4",
                  "product_id": "T038386"
                }
              },
              {
                "category": "product_version",
                "name": "10.4.0.4",
                "product": {
                  "name": "Oracle Communications 10.4.0.4",
                  "product_id": "T038386-fixed",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:oracle:communications:10.4.0.4"
                  }
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=9.1.1.8.0",
                "product": {
                  "name": "Oracle Communications \u003c=9.1.1.8.0",
                  "product_id": "T038426"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003c=9.1.1.8.0",
                "product": {
                  "name": "Oracle Communications \u003c=9.1.1.8.0",
                  "product_id": "T038426-fixed"
                }
              }
            ],
            "category": "product_name",
            "name": "Communications"
          }
        ],
        "category": "vendor",
        "name": "Oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2022-2068",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-23437",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-23437"
    },
    {
      "cve": "CVE-2022-2601",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-36760",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2023-2953",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3635",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-3635"
    },
    {
      "cve": "CVE-2023-38408",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-4043",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-4043"
    },
    {
      "cve": "CVE-2023-46136",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-48795",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51775",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-51775"
    },
    {
      "cve": "CVE-2023-5685",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-6597",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6816",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2023-6816"
    },
    {
      "cve": "CVE-2024-0450",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-22020",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22020"
    },
    {
      "cve": "CVE-2024-22257",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22257"
    },
    {
      "cve": "CVE-2024-22262",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-22262"
    },
    {
      "cve": "CVE-2024-23672",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-2398",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-25062",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-25638",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-26308",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-26308"
    },
    {
      "cve": "CVE-2024-28182",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28849",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-28849"
    },
    {
      "cve": "CVE-2024-29025",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29736",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29736"
    },
    {
      "cve": "CVE-2024-29857",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-29857"
    },
    {
      "cve": "CVE-2024-30251",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-30251"
    },
    {
      "cve": "CVE-2024-31080",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31744",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-31744"
    },
    {
      "cve": "CVE-2024-32760",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-32760"
    },
    {
      "cve": "CVE-2024-33602",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34750",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-34750"
    },
    {
      "cve": "CVE-2024-37371",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38816",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-38816"
    },
    {
      "cve": "CVE-2024-40898",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-43044",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-45492",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-45492"
    },
    {
      "cve": "CVE-2024-4577",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-4577"
    },
    {
      "cve": "CVE-2024-4603",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-5971",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-5971"
    },
    {
      "cve": "CVE-2024-6162",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-6162"
    },
    {
      "cve": "CVE-2024-6387",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-7254",
      "notes": [
        {
          "category": "description",
          "text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"MITTEL\" f\u00fcr die Schadensh\u00f6he."
        }
      ],
      "product_status": {
        "known_affected": [
          "T036209",
          "T036205",
          "T036206",
          "T036207",
          "T036208",
          "T034147",
          "T038386",
          "T034146",
          "T034145",
          "T034144",
          "T038382",
          "T038383",
          "T038384",
          "T038385",
          "T038380",
          "T038381",
          "T027338",
          "T027333",
          "T028684",
          "T038379",
          "T038376",
          "T038378",
          "T036195",
          "T038373",
          "T036196",
          "T032090",
          "T032091"
        ],
        "last_affected": [
          "T038426",
          "T036197",
          "T038375",
          "T038377"
        ]
      },
      "release_date": "2024-10-15T22:00:00.000+00:00",
      "title": "CVE-2024-7254"
    }
  ]
}
  gsd-2024-31080
Vulnerability from gsd
{
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2024-31080"
      ],
      "details": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads.",
      "id": "GSD-2024-31080",
      "modified": "2024-04-03T05:02:25.534200Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "secalert@redhat.com",
        "ID": "CVE-2024-31080",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Red Hat Enterprise Linux 7",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.20.4-29.el7_9",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.13.1-2.el8_9.10",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.9.0-15.el8_2.11",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.2 Telecommunications Update Service",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.9.0-15.el8_2.11",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.9.0-15.el8_2.11",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.11.0-8.el8_4.10",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.4 Telecommunications Update Service",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.11.0-8.el8_4.10",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.11.0-8.el8_4.10",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.6 Extended Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.12.0-6.el8_6.11",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 8.8 Extended Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.12.0-15.el8_8.10",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 9.0 Extended Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.11.0-22.el9_0.11",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 9.2 Extended Update Support",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "lessThan": "*",
                                "status": "unaffected",
                                "version": "0:1.12.0-14.el9_2.8",
                                "versionType": "rpm"
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 6",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "unknown"
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "unknown"
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Red Hat Enterprise Linux 9",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        },
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected"
                          }
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Red Hat"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-126",
                "lang": "eng",
                "value": "Buffer Over-read"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:1785",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:1785"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2036",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2036"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2037",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2037"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2038",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2038"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2039",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2039"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2040",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2040"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2041",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2041"
          },
          {
            "name": "https://access.redhat.com/errata/RHSA-2024:2042",
            "refsource": "MISC",
            "url": "https://access.redhat.com/errata/RHSA-2024:2042"
          },
          {
            "name": "https://access.redhat.com/security/cve/CVE-2024-31080",
            "refsource": "MISC",
            "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
          },
          {
            "name": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997",
            "refsource": "MISC",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
          },
          {
            "name": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html",
            "refsource": "MISC",
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/"
          }
        ]
      },
      "work_around": [
        {
          "lang": "en",
          "value": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability."
        }
      ]
    },
    "nvd.nist.gov": {
      "cve": {
        "descriptions": [
          {
            "lang": "en",
            "value": "A heap-based buffer over-read vulnerability was found in the X.org server\u0027s ProcXIGetSelectedEvents() function. This issue occurs when byte-swapped length values are used in replies, potentially leading to memory leakage and segmentation faults, particularly when triggered by a client with a different endianness. This vulnerability could be exploited by an attacker to cause the X server to read heap memory values and then transmit them back to the client until encountering an unmapped page, resulting in a crash. Despite the attacker\u0027s inability to control the specific memory copied into the replies, the small length values typically stored in a 32-bit integer can result in significant attempted out-of-bounds reads."
          },
          {
            "lang": "es",
            "value": "Se encontr\u00f3 una vulnerabilidad de sobrelectura del b\u00fafer basado en mont\u00f3n en la funci\u00f3n ProcXIGetSelectedEvents() del servidor X.org. Este problema se produce cuando se utilizan valores de longitud de bytes intercambiados en las respuestas, lo que puede provocar p\u00e9rdidas de memoria y errores de segmentaci\u00f3n, especialmente cuando lo activa un cliente con una endianidad diferente. Un atacante podr\u00eda aprovechar esta vulnerabilidad para hacer que el servidor X lea los valores de la memoria din\u00e1mica y luego los transmita de vuelta al cliente hasta encontrar una p\u00e1gina no asignada, lo que provocar\u00eda un bloqueo. A pesar de la incapacidad del atacante para controlar la memoria espec\u00edfica copiada en las respuestas, los peque\u00f1os valores de longitud que normalmente se almacenan en un entero de 32 bits pueden dar como resultado importantes intentos de lecturas fuera de los l\u00edmites."
          }
        ],
        "id": "CVE-2024-31080",
        "lastModified": "2024-04-25T18:15:08.253",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "HIGH",
                "baseScore": 7.3,
                "baseSeverity": "HIGH",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "LOW",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 5.5,
              "source": "secalert@redhat.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2024-04-04T14:15:10.330",
        "references": [
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:1785"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2036"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2037"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2038"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2039"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2040"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2041"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/errata/RHSA-2024:2042"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://access.redhat.com/security/cve/CVE-2024-31080"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271997"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00009.html"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6TF7FZXOKHIKPZXYIMSQXKVH7WITKV3V/"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBLQJIAXEDMEGRGZMSH7CWUJHSVKUWLV/"
          },
          {
            "source": "secalert@redhat.com",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P73U4DAAWLFZAPD75GLXTGMSTTQWW5AP/"
          }
        ],
        "sourceIdentifier": "secalert@redhat.com",
        "vulnStatus": "Awaiting Analysis",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-126"
              }
            ],
            "source": "secalert@redhat.com",
            "type": "Primary"
          }
        ]
      }
    }
  }
}
  msrc_cve-2024-31080
Vulnerability from csaf_microsoft
Notes
{
  "document": {
    "category": "csaf_vex",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Public",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "general",
        "text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
        "title": "Additional Resources"
      },
      {
        "category": "legal_disclaimer",
        "text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
        "title": "Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "secure@microsoft.com",
      "name": "Microsoft Security Response Center",
      "namespace": "https://msrc.microsoft.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "CVE-2024-31080 Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents - VEX",
        "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-31080.json"
      },
      {
        "category": "external",
        "summary": "Microsoft Support Lifecycle",
        "url": "https://support.microsoft.com/lifecycle"
      },
      {
        "category": "external",
        "summary": "Common Vulnerability Scoring System",
        "url": "https://www.first.org/cvss"
      }
    ],
    "title": "Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents",
    "tracking": {
      "current_release_date": "2024-12-03T00:00:00.000Z",
      "generator": {
        "date": "2025-10-20T01:14:16.717Z",
        "engine": {
          "name": "MSRC Generator",
          "version": "1.0"
        }
      },
      "id": "msrc_CVE-2024-31080",
      "initial_release_date": "2024-04-02T07:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-08-18T00:00:00.000Z",
          "legacy_version": "1",
          "number": "1",
          "summary": "Information published."
        },
        {
          "date": "2024-10-05T00:00:00.000Z",
          "legacy_version": "1.1",
          "number": "2",
          "summary": "Information published."
        },
        {
          "date": "2024-12-03T00:00:00.000Z",
          "legacy_version": "1.2",
          "number": "3",
          "summary": "Added xorg-x11-server to CBL-Mariner 2.0"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "2.0",
                "product": {
                  "name": "CBL Mariner 2.0",
                  "product_id": "17086"
                }
              }
            ],
            "category": "product_name",
            "name": "Azure Linux"
          },
          {
            "branches": [
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 xorg-x11-server 1.20.10-11",
                "product": {
                  "name": "\u003ccbl2 xorg-x11-server 1.20.10-11",
                  "product_id": "2"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 xorg-x11-server 1.20.10-11",
                "product": {
                  "name": "cbl2 xorg-x11-server 1.20.10-11",
                  "product_id": "17370"
                }
              },
              {
                "category": "product_version_range",
                "name": "\u003ccbl2 xorg-x11-server 1.20.10-15",
                "product": {
                  "name": "\u003ccbl2 xorg-x11-server 1.20.10-15",
                  "product_id": "1"
                }
              },
              {
                "category": "product_version",
                "name": "cbl2 xorg-x11-server 1.20.10-15",
                "product": {
                  "name": "cbl2 xorg-x11-server 1.20.10-15",
                  "product_id": "19982"
                }
              }
            ],
            "category": "product_name",
            "name": "xorg-x11-server"
          }
        ],
        "category": "vendor",
        "name": "Microsoft"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 xorg-x11-server 1.20.10-11 as a component of CBL Mariner 2.0",
          "product_id": "17086-2"
        },
        "product_reference": "2",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 xorg-x11-server 1.20.10-11 as a component of CBL Mariner 2.0",
          "product_id": "17370-17086"
        },
        "product_reference": "17370",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "\u003ccbl2 xorg-x11-server 1.20.10-15 as a component of CBL Mariner 2.0",
          "product_id": "17086-1"
        },
        "product_reference": "1",
        "relates_to_product_reference": "17086"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cbl2 xorg-x11-server 1.20.10-15 as a component of CBL Mariner 2.0",
          "product_id": "19982-17086"
        },
        "product_reference": "19982",
        "relates_to_product_reference": "17086"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "general",
          "text": "redhat",
          "title": "Assigning CNA"
        }
      ],
      "product_status": {
        "fixed": [
          "17370-17086",
          "19982-17086"
        ],
        "known_affected": [
          "17086-2",
          "17086-1"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31080 Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents - VEX",
          "url": "https://msrc.microsoft.com/csaf/vex/2024/msrc_cve-2024-31080.json"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2024-08-18T00:00:00.000Z",
          "details": "1.20.10-11:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
          "product_ids": [
            "17086-2",
            "17086-1"
          ],
          "url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalsScore": 0.0,
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "temporalScore": 7.3,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "17086-2",
            "17086-1"
          ]
        }
      ],
      "title": "Xorg-x11-server: heap buffer overread/data leakage in procxigetselectedevents"
    }
  ]
}
  NCSC-2024-0414
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Unchecked Input for Loop Condition",
        "title": "CWE-606"
      },
      {
        "category": "general",
        "text": "Detection of Error Condition Without Action",
        "title": "CWE-390"
      },
      {
        "category": "general",
        "text": "Asymmetric Resource Consumption (Amplification)",
        "title": "CWE-405"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "Signal Handler Race Condition",
        "title": "CWE-364"
      },
      {
        "category": "general",
        "text": "Multiple Interpretations of UI Input",
        "title": "CWE-450"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Buffer Over-read",
        "title": "CWE-126"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
        "title": "CWE-88"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Improper Handling of Exceptional Conditions",
        "title": "CWE-755"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Inefficient Algorithmic Complexity",
        "title": "CWE-407"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
        "title": "CWE-601"
      },
      {
        "category": "general",
        "text": "Signed to Unsigned Conversion Error",
        "title": "CWE-195"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Improper Encoding or Escaping of Output",
        "title": "CWE-116"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "UNIX Symbolic Link (Symlink) Following",
        "title": "CWE-61"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Incomplete Cleanup",
        "title": "CWE-459"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Uncaught Exception",
        "title": "CWE-248"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
        "url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Communications",
    "tracking": {
      "current_release_date": "2024-10-17T13:17:52.103171Z",
      "id": "NCSC-2024-0414",
      "initial_release_date": "2024-10-17T13:17:52.103171Z",
      "revision_history": [
        {
          "date": "2024-10-17T13:17:52.103171Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635313",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635305",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635311",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635312",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635323",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670430",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674632",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635320",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670439",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670429",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670435",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670431",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670436",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670432",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635321",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635310",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635318",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674640",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674642",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670434",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674639",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635314",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674638",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674637",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635306",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635307",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635319",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670438",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635315",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670433",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674641",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674636",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670437",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674631",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635308",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635309",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications__10.4.0.4",
            "product": {
              "name": "communications__10.4.0.4",
              "product_id": "CSAFPID-1674629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.2",
            "product": {
              "name": "communications___23.4.2",
              "product_id": "CSAFPID-1670442",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.3",
            "product": {
              "name": "communications___23.4.3",
              "product_id": "CSAFPID-1635325",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.4",
            "product": {
              "name": "communications___23.4.4",
              "product_id": "CSAFPID-1635326",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.5",
            "product": {
              "name": "communications___23.4.5",
              "product_id": "CSAFPID-1674645",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.6",
            "product": {
              "name": "communications___23.4.6",
              "product_id": "CSAFPID-1674646",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___24.2.0",
            "product": {
              "name": "communications___24.2.0",
              "product_id": "CSAFPID-1674644",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___7.2.1.0.0",
            "product": {
              "name": "communications___7.2.1.0.0",
              "product_id": "CSAFPID-1670441",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.6",
            "product": {
              "name": "communications___8.6.0.6",
              "product_id": "CSAFPID-1635327",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.8",
            "product": {
              "name": "communications___8.6.0.8",
              "product_id": "CSAFPID-1635328",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.2",
            "product": {
              "name": "communications___9.0.2",
              "product_id": "CSAFPID-1670440",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.3",
            "product": {
              "name": "communications___9.0.3",
              "product_id": "CSAFPID-1635329",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.1.1.8.0",
            "product": {
              "name": "communications___9.1.1.8.0",
              "product_id": "CSAFPID-1674643",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674621",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674618",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674619",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674617",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674620",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___12.0.6.0.0",
            "product": {
              "name": "communications_applications___12.0.6.0.0",
              "product_id": "CSAFPID-1674627",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___5.5.22",
            "product": {
              "name": "communications_applications___5.5.22",
              "product_id": "CSAFPID-1674626",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.3",
            "product": {
              "name": "communications_applications___6.0.3",
              "product_id": "CSAFPID-1674628",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.4",
            "product": {
              "name": "communications_applications___6.0.4",
              "product_id": "CSAFPID-1674624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.5",
            "product": {
              "name": "communications_applications___6.0.5",
              "product_id": "CSAFPID-1674625",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-204629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-1673475",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-816792",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-764735",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-1650734",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-204639",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-204627",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-816793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-912557",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
            "product": {
              "name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
              "product_id": "CSAFPID-219835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-764247",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209549",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-41194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-1650820",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-765241",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-498607",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-912556",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_calendar_server",
            "product": {
              "name": "communications_calendar_server",
              "product_id": "CSAFPID-764736",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_calendar_server",
            "product": {
              "name": "communications_calendar_server",
              "product_id": "CSAFPID-220190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_configuration_console",
            "product": {
              "name": "communications_cloud_native_configuration_console",
              "product_id": "CSAFPID-391501",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_configuration_console",
            "product": {
              "name": "communications_cloud_native_configuration_console",
              "product_id": "CSAFPID-440102",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-89545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-180215",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-180197",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-41516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-41515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220057",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220055",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816766",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1503577",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673416",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673412",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673411",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-764237",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-2045",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-40612",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-608629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-93784",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1899",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-41111",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1685",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-493445",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-294401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-220547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-764824",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-220459",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45184",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45181",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611405",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611403",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611404",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1650752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1673396",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-912066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1503323",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673526",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673391",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673394",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-165550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-93546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-180195",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-40299",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-187447",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-45186",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-45185",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-220559",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-220558",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-764238",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-764239",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816768",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816769",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-912085",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1503578",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673389",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673390",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673421",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673420",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-764825",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816770",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816771",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-912068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-1503579",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-180201",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-1900",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-760687",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-40947",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-93635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-503534",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-90018",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-220327",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-94290",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-220325",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-614513",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-643776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-816772",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-912076",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-1503580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40613",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-2044",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40301",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-180194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-449747",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40298",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-223527",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-449746",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-503493",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-260394",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-219838",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-611387",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-618156",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-816773",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912101",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1673473",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1503581",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912539",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912540",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912541",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912542",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912543",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-40611",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-40609",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-180198",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-41112",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-41110",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-760688",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-493444",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-93633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220056",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-223511",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-216017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220889",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220918",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614514",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816346",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912077",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1503322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673415",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816775",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912544",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-40608",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-180199",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-41113",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-260395",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-260393",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816348",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-912545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816347",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-1673494",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-1673501",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-764240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-220468",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-2310",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-93547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-180200",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-180193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1898",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-93636",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-90020",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-90015",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-220133",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1650751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673395",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-912069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-765371",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-180216",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-180202",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-40300",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-93653",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-40949",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-642000",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-93634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220561",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-90021",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-94292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-218028",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220881",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-94291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220910",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-611401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-816778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-614517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673392",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1503582",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673393",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-40610",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-611587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-642002",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-493443",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-642001",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-224796",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-224795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912102",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912549",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503583",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503584",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503585",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1672767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-180217",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-180196",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-165576",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-40297",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764899",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-589926",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-179780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-40948",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-589925",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-179779",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-90019",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-90016",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-220326",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764241",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912078",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816349",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1673399",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816779",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-764737",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-224787",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-220189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-764827",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-764828",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server_-_service_controller",
            "product": {
              "name": "communications_converged_application_server_-_service_controller",
              "product_id": "CSAFPID-764734",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server_-_service_controller",
            "product": {
              "name": "communications_converged_application_server_-_service_controller",
              "product_id": "CSAFPID-426842",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503599",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-345031",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-204635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-764833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-224793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-816794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-342793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1650777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1265",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-764248",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-816350",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1261",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-110244",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-110242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-93777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-1672764",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-93772",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_data_model",
            "product": {
              "name": "communications_data_model",
              "product_id": "CSAFPID-764902",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-765372",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-342799",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704412",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704411",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-165544",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704410",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-41183",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_intelligence_hub",
            "product": {
              "name": "communications_diameter_intelligence_hub",
              "product_id": "CSAFPID-342802",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_intelligence_hub",
            "product": {
              "name": "communications_diameter_intelligence_hub",
              "product_id": "CSAFPID-764829",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1503588",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1892",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1891",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1888",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1887",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1889",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1884",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1885",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1882",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1881",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1883",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1879",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1880",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-40293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1650826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1650830",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-611413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912551",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912552",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_application_processor",
            "product": {
              "name": "communications_eagle_application_processor",
              "product_id": "CSAFPID-1673417",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_application_processor",
            "product": {
              "name": "communications_eagle_application_processor",
              "product_id": "CSAFPID-765369",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-204528",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_ftp_table_base_retrieval",
            "product": {
              "name": "communications_eagle_ftp_table_base_retrieval",
              "product_id": "CSAFPID-204623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_lnp_application_processor",
            "product": {
              "name": "communications_eagle_lnp_application_processor",
              "product_id": "CSAFPID-352633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_lnp_application_processor",
            "product": {
              "name": "communications_eagle_lnp_application_processor",
              "product_id": "CSAFPID-352632",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_software",
            "product": {
              "name": "communications_eagle_software",
              "product_id": "CSAFPID-765366",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_software",
            "product": {
              "name": "communications_eagle_software",
              "product_id": "CSAFPID-765365",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_elastic_charging_engine",
            "product": {
              "name": "communications_elastic_charging_engine",
              "product_id": "CSAFPID-764834",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-764242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-9226",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-9070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-8845",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-2286",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204464",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-345038",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-93629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-611422",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-93630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-816780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_evolved_communications_application_server",
            "product": {
              "name": "communications_evolved_communications_application_server",
              "product_id": "CSAFPID-204645",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816782",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-912553",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-207586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-234306",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-219803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-387664",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_interactive_session_recorder",
            "product": {
              "name": "communications_interactive_session_recorder",
              "product_id": "CSAFPID-1893",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-204622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-219909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_lsms",
            "product": {
              "name": "communications_lsms",
              "product_id": "CSAFPID-1673065",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-764835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-375182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-816351",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-41182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_metasolv_solution",
            "product": {
              "name": "communications_metasolv_solution",
              "product_id": "CSAFPID-611595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_metasolv_solution",
            "product": {
              "name": "communications_metasolv_solution",
              "product_id": "CSAFPID-226017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-220167",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816353",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-764243",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816352",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503590",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1673414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816783",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816786",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816784",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816787",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816785",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816788",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-342803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1650778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1266",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-764249",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-816354",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-204563",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-220125",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-245244",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-219776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-204554",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-765242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-9489",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-110249",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-93781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-220132",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-912079",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-224791",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-219898",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-224790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-221118",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-179774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-1673496",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence",
            "product": {
              "name": "communications_performance_intelligence",
              "product_id": "CSAFPID-1503591",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center",
            "product": {
              "name": "communications_performance_intelligence_center",
              "product_id": "CSAFPID-1673485",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-765367",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-765368",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-764830",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-573035",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-45192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-611406",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816789",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-764738",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-204595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-204590",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-816355",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503601",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816359",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816358",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816357",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-912558",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503602",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816796",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816797",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_services_gatekeeper",
            "product": {
              "name": "communications_services_gatekeeper",
              "product_id": "CSAFPID-608630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503592",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503593",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1672762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503594",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-342804",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-704413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2296",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-166028",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2290",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2288",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2282",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2285",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2279",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-204634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-345039",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-93628",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-611423",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-93631",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-816791",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-342805",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-704414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-166027",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2295",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2289",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2287",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2283",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2284",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2280",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2281",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-220414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-204607",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_router",
            "product": {
              "name": "communications_session_router",
              "product_id": "CSAFPID-764780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_router",
            "product": {
              "name": "communications_session_router",
              "product_id": "CSAFPID-764781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_subscriber-aware_load_balancer",
            "product": {
              "name": "communications_subscriber-aware_load_balancer",
              "product_id": "CSAFPID-93775",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_subscriber-aware_load_balancer",
            "product": {
              "name": "communications_subscriber-aware_load_balancer",
              "product_id": "CSAFPID-93774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-240600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673382",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78764",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78763",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673381",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1650731",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673530",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-764901",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78761",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-614089",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-764739",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204614",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-8984",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204510",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204569",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-219826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-912073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_session_manager",
            "product": {
              "name": "communications_unified_session_manager",
              "product_id": "CSAFPID-110243",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_session_manager",
            "product": {
              "name": "communications_unified_session_manager",
              "product_id": "CSAFPID-205759",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503596",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503598",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-764900",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-76994",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-568240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-764782",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-355340",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-912080",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1673481",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-912554",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-611408",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-703515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-611407",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-204456",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-37137",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-41182",
          "CSAFPID-209546",
          "CSAFPID-40608",
          "CSAFPID-180216",
          "CSAFPID-93547",
          "CSAFPID-180217",
          "CSAFPID-2310",
          "CSAFPID-40612",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45182",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-216017",
          "CSAFPID-764240",
          "CSAFPID-90021",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-94291",
          "CSAFPID-493443",
          "CSAFPID-224796",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-40293",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-93781",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-342793",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-342803",
          "CSAFPID-204563",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-1899",
          "CSAFPID-41111",
          "CSAFPID-40299",
          "CSAFPID-187447",
          "CSAFPID-1900",
          "CSAFPID-40301",
          "CSAFPID-180194",
          "CSAFPID-40298",
          "CSAFPID-41112",
          "CSAFPID-41110",
          "CSAFPID-41113",
          "CSAFPID-180193",
          "CSAFPID-1898",
          "CSAFPID-40300",
          "CSAFPID-611587",
          "CSAFPID-40297",
          "CSAFPID-110244",
          "CSAFPID-110242",
          "CSAFPID-9489",
          "CSAFPID-110249",
          "CSAFPID-40294",
          "CSAFPID-110243",
          "CSAFPID-204629",
          "CSAFPID-765241",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-41183",
          "CSAFPID-207586",
          "CSAFPID-765242",
          "CSAFPID-205759",
          "CSAFPID-1893",
          "CSAFPID-765365",
          "CSAFPID-765366",
          "CSAFPID-342804",
          "CSAFPID-342805",
          "CSAFPID-204456",
          "CSAFPID-1882",
          "CSAFPID-573035",
          "CSAFPID-204645",
          "CSAFPID-765367",
          "CSAFPID-765368",
          "CSAFPID-764242",
          "CSAFPID-76994",
          "CSAFPID-204623",
          "CSAFPID-352633",
          "CSAFPID-352632",
          "CSAFPID-765369",
          "CSAFPID-204528",
          "CSAFPID-342802",
          "CSAFPID-40610",
          "CSAFPID-40611",
          "CSAFPID-40609",
          "CSAFPID-180198",
          "CSAFPID-180196",
          "CSAFPID-180201",
          "CSAFPID-180202",
          "CSAFPID-40613",
          "CSAFPID-180199",
          "CSAFPID-93546",
          "CSAFPID-180195",
          "CSAFPID-180200",
          "CSAFPID-765371",
          "CSAFPID-89545",
          "CSAFPID-180215",
          "CSAFPID-180197",
          "CSAFPID-204639",
          "CSAFPID-204627",
          "CSAFPID-226017",
          "CSAFPID-219898",
          "CSAFPID-179774",
          "CSAFPID-342799",
          "CSAFPID-765372",
          "CSAFPID-220125",
          "CSAFPID-245244",
          "CSAFPID-204554",
          "CSAFPID-764739",
          "CSAFPID-204614",
          "CSAFPID-345031",
          "CSAFPID-204635",
          "CSAFPID-204595",
          "CSAFPID-204590",
          "CSAFPID-224787",
          "CSAFPID-1673381",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-37137",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-41182",
            "CSAFPID-209546",
            "CSAFPID-40608",
            "CSAFPID-180216",
            "CSAFPID-93547",
            "CSAFPID-180217",
            "CSAFPID-2310",
            "CSAFPID-40612",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45182",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-216017",
            "CSAFPID-764240",
            "CSAFPID-90021",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-94291",
            "CSAFPID-493443",
            "CSAFPID-224796",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-40293",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-93781",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-342793",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-342803",
            "CSAFPID-204563",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-1899",
            "CSAFPID-41111",
            "CSAFPID-40299",
            "CSAFPID-187447",
            "CSAFPID-1900",
            "CSAFPID-40301",
            "CSAFPID-180194",
            "CSAFPID-40298",
            "CSAFPID-41112",
            "CSAFPID-41110",
            "CSAFPID-41113",
            "CSAFPID-180193",
            "CSAFPID-1898",
            "CSAFPID-40300",
            "CSAFPID-611587",
            "CSAFPID-40297",
            "CSAFPID-110244",
            "CSAFPID-110242",
            "CSAFPID-9489",
            "CSAFPID-110249",
            "CSAFPID-40294",
            "CSAFPID-110243",
            "CSAFPID-204629",
            "CSAFPID-765241",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-41183",
            "CSAFPID-207586",
            "CSAFPID-765242",
            "CSAFPID-205759",
            "CSAFPID-1893",
            "CSAFPID-765365",
            "CSAFPID-765366",
            "CSAFPID-342804",
            "CSAFPID-342805",
            "CSAFPID-204456",
            "CSAFPID-1882",
            "CSAFPID-573035",
            "CSAFPID-204645",
            "CSAFPID-765367",
            "CSAFPID-765368",
            "CSAFPID-764242",
            "CSAFPID-76994",
            "CSAFPID-204623",
            "CSAFPID-352633",
            "CSAFPID-352632",
            "CSAFPID-765369",
            "CSAFPID-204528",
            "CSAFPID-342802",
            "CSAFPID-40610",
            "CSAFPID-40611",
            "CSAFPID-40609",
            "CSAFPID-180198",
            "CSAFPID-180196",
            "CSAFPID-180201",
            "CSAFPID-180202",
            "CSAFPID-40613",
            "CSAFPID-180199",
            "CSAFPID-93546",
            "CSAFPID-180195",
            "CSAFPID-180200",
            "CSAFPID-765371",
            "CSAFPID-89545",
            "CSAFPID-180215",
            "CSAFPID-180197",
            "CSAFPID-204639",
            "CSAFPID-204627",
            "CSAFPID-226017",
            "CSAFPID-219898",
            "CSAFPID-179774",
            "CSAFPID-342799",
            "CSAFPID-765372",
            "CSAFPID-220125",
            "CSAFPID-245244",
            "CSAFPID-204554",
            "CSAFPID-764739",
            "CSAFPID-204614",
            "CSAFPID-345031",
            "CSAFPID-204635",
            "CSAFPID-204595",
            "CSAFPID-204590",
            "CSAFPID-224787",
            "CSAFPID-1673381",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2021-37137"
    },
    {
      "cve": "CVE-2022-2068",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-40949",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45182",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-216017",
          "CSAFPID-764240",
          "CSAFPID-90021",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-94291",
          "CSAFPID-493443",
          "CSAFPID-224796",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-40293",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-93781",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-342793",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-342803",
          "CSAFPID-204563",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-40294",
          "CSAFPID-93631",
          "CSAFPID-764900",
          "CSAFPID-568240",
          "CSAFPID-355340",
          "CSAFPID-703515",
          "CSAFPID-204456",
          "CSAFPID-764735",
          "CSAFPID-204635",
          "CSAFPID-41183",
          "CSAFPID-234306",
          "CSAFPID-41182",
          "CSAFPID-226017",
          "CSAFPID-219898",
          "CSAFPID-179774",
          "CSAFPID-764738",
          "CSAFPID-764901",
          "CSAFPID-764902",
          "CSAFPID-220547",
          "CSAFPID-187447",
          "CSAFPID-760687",
          "CSAFPID-40947",
          "CSAFPID-2044",
          "CSAFPID-449747",
          "CSAFPID-40301",
          "CSAFPID-449746",
          "CSAFPID-40298",
          "CSAFPID-223527",
          "CSAFPID-760688",
          "CSAFPID-93636",
          "CSAFPID-40300",
          "CSAFPID-93653",
          "CSAFPID-642000",
          "CSAFPID-642002",
          "CSAFPID-642001",
          "CSAFPID-165576",
          "CSAFPID-764899",
          "CSAFPID-40948",
          "CSAFPID-426842",
          "CSAFPID-93630",
          "CSAFPID-204645",
          "CSAFPID-1893",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2068",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-40949",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45182",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-216017",
            "CSAFPID-764240",
            "CSAFPID-90021",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-94291",
            "CSAFPID-493443",
            "CSAFPID-224796",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-40293",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-93781",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-342793",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-342803",
            "CSAFPID-204563",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-40294",
            "CSAFPID-93631",
            "CSAFPID-764900",
            "CSAFPID-568240",
            "CSAFPID-355340",
            "CSAFPID-703515",
            "CSAFPID-204456",
            "CSAFPID-764735",
            "CSAFPID-204635",
            "CSAFPID-41183",
            "CSAFPID-234306",
            "CSAFPID-41182",
            "CSAFPID-226017",
            "CSAFPID-219898",
            "CSAFPID-179774",
            "CSAFPID-764738",
            "CSAFPID-764901",
            "CSAFPID-764902",
            "CSAFPID-220547",
            "CSAFPID-187447",
            "CSAFPID-760687",
            "CSAFPID-40947",
            "CSAFPID-2044",
            "CSAFPID-449747",
            "CSAFPID-40301",
            "CSAFPID-449746",
            "CSAFPID-40298",
            "CSAFPID-223527",
            "CSAFPID-760688",
            "CSAFPID-93636",
            "CSAFPID-40300",
            "CSAFPID-93653",
            "CSAFPID-642000",
            "CSAFPID-642002",
            "CSAFPID-642001",
            "CSAFPID-165576",
            "CSAFPID-764899",
            "CSAFPID-40948",
            "CSAFPID-426842",
            "CSAFPID-93630",
            "CSAFPID-204645",
            "CSAFPID-1893",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-2601",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-23437",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-204629",
          "CSAFPID-704410",
          "CSAFPID-704411",
          "CSAFPID-704412",
          "CSAFPID-226017",
          "CSAFPID-179774",
          "CSAFPID-219898",
          "CSAFPID-219826",
          "CSAFPID-204569",
          "CSAFPID-204510",
          "CSAFPID-220057",
          "CSAFPID-220055",
          "CSAFPID-220909",
          "CSAFPID-45184",
          "CSAFPID-45182",
          "CSAFPID-220559",
          "CSAFPID-220558",
          "CSAFPID-220327",
          "CSAFPID-220325",
          "CSAFPID-219838",
          "CSAFPID-220056",
          "CSAFPID-223511",
          "CSAFPID-216017",
          "CSAFPID-220889",
          "CSAFPID-220918",
          "CSAFPID-90020",
          "CSAFPID-90015",
          "CSAFPID-220133",
          "CSAFPID-220561",
          "CSAFPID-90021",
          "CSAFPID-220881",
          "CSAFPID-94291",
          "CSAFPID-220910",
          "CSAFPID-220324",
          "CSAFPID-224796",
          "CSAFPID-224795",
          "CSAFPID-220326",
          "CSAFPID-764734",
          "CSAFPID-40293",
          "CSAFPID-220167",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764736",
          "CSAFPID-764737",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-219803",
          "CSAFPID-375182",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-219776",
          "CSAFPID-224791",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-764738",
          "CSAFPID-240600",
          "CSAFPID-764739",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-764240",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-493443",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-204563",
          "CSAFPID-8984",
          "CSAFPID-220548",
          "CSAFPID-608629",
          "CSAFPID-93784",
          "CSAFPID-41111",
          "CSAFPID-1685",
          "CSAFPID-493445",
          "CSAFPID-294401",
          "CSAFPID-220547",
          "CSAFPID-764824",
          "CSAFPID-220459",
          "CSAFPID-764825",
          "CSAFPID-93635",
          "CSAFPID-503534",
          "CSAFPID-503493",
          "CSAFPID-493444",
          "CSAFPID-93633",
          "CSAFPID-260395",
          "CSAFPID-260393",
          "CSAFPID-220468",
          "CSAFPID-93636",
          "CSAFPID-93634",
          "CSAFPID-589926",
          "CSAFPID-179780",
          "CSAFPID-589925",
          "CSAFPID-179779",
          "CSAFPID-764826",
          "CSAFPID-764827",
          "CSAFPID-764828",
          "CSAFPID-764829",
          "CSAFPID-764830",
          "CSAFPID-220190",
          "CSAFPID-220189",
          "CSAFPID-764833",
          "CSAFPID-41183",
          "CSAFPID-764834",
          "CSAFPID-234306",
          "CSAFPID-764835",
          "CSAFPID-187447",
          "CSAFPID-760687",
          "CSAFPID-40947",
          "CSAFPID-2044",
          "CSAFPID-449747",
          "CSAFPID-40301",
          "CSAFPID-449746",
          "CSAFPID-40298",
          "CSAFPID-223527",
          "CSAFPID-760688",
          "CSAFPID-40300",
          "CSAFPID-93653",
          "CSAFPID-40949",
          "CSAFPID-642000",
          "CSAFPID-642002",
          "CSAFPID-642001",
          "CSAFPID-165576",
          "CSAFPID-764899",
          "CSAFPID-40948",
          "CSAFPID-426842",
          "CSAFPID-93630",
          "CSAFPID-204645",
          "CSAFPID-1893",
          "CSAFPID-40294",
          "CSAFPID-93631",
          "CSAFPID-764900",
          "CSAFPID-568240",
          "CSAFPID-355340",
          "CSAFPID-703515",
          "CSAFPID-204456",
          "CSAFPID-204635",
          "CSAFPID-41182",
          "CSAFPID-764901",
          "CSAFPID-764902",
          "CSAFPID-1899",
          "CSAFPID-40299",
          "CSAFPID-1900",
          "CSAFPID-180194",
          "CSAFPID-41112",
          "CSAFPID-41110",
          "CSAFPID-41113",
          "CSAFPID-180193",
          "CSAFPID-1898",
          "CSAFPID-611587",
          "CSAFPID-40297",
          "CSAFPID-110244",
          "CSAFPID-110242",
          "CSAFPID-9489",
          "CSAFPID-110249",
          "CSAFPID-110243",
          "CSAFPID-765241",
          "CSAFPID-209546",
          "CSAFPID-207586",
          "CSAFPID-765242",
          "CSAFPID-205759",
          "CSAFPID-765365",
          "CSAFPID-765366",
          "CSAFPID-342804",
          "CSAFPID-342805",
          "CSAFPID-1882",
          "CSAFPID-573035",
          "CSAFPID-765367",
          "CSAFPID-765368",
          "CSAFPID-764242",
          "CSAFPID-76994",
          "CSAFPID-204623",
          "CSAFPID-352633",
          "CSAFPID-352632",
          "CSAFPID-765369",
          "CSAFPID-204528",
          "CSAFPID-342802",
          "CSAFPID-40610",
          "CSAFPID-40611",
          "CSAFPID-40609",
          "CSAFPID-180198",
          "CSAFPID-180217",
          "CSAFPID-180196",
          "CSAFPID-40612",
          "CSAFPID-180201",
          "CSAFPID-180216",
          "CSAFPID-180202",
          "CSAFPID-40613",
          "CSAFPID-40608",
          "CSAFPID-180199",
          "CSAFPID-93546",
          "CSAFPID-180195",
          "CSAFPID-2310",
          "CSAFPID-93547",
          "CSAFPID-180200",
          "CSAFPID-765371",
          "CSAFPID-89545",
          "CSAFPID-180215",
          "CSAFPID-180197",
          "CSAFPID-204639",
          "CSAFPID-204627",
          "CSAFPID-342799",
          "CSAFPID-765372",
          "CSAFPID-220125",
          "CSAFPID-245244",
          "CSAFPID-204554",
          "CSAFPID-204614",
          "CSAFPID-345031",
          "CSAFPID-204595",
          "CSAFPID-204590",
          "CSAFPID-224787",
          "CSAFPID-1673065",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-23437",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json"
        }
      ],
      "title": "CVE-2022-23437"
    },
    {
      "cve": "CVE-2022-36760",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220057",
          "CSAFPID-220055",
          "CSAFPID-220909",
          "CSAFPID-45184",
          "CSAFPID-45182",
          "CSAFPID-220559",
          "CSAFPID-220558",
          "CSAFPID-220327",
          "CSAFPID-220325",
          "CSAFPID-219838",
          "CSAFPID-220056",
          "CSAFPID-223511",
          "CSAFPID-216017",
          "CSAFPID-220889",
          "CSAFPID-220918",
          "CSAFPID-90020",
          "CSAFPID-90015",
          "CSAFPID-220133",
          "CSAFPID-220561",
          "CSAFPID-90021",
          "CSAFPID-220881",
          "CSAFPID-94291",
          "CSAFPID-220910",
          "CSAFPID-220324",
          "CSAFPID-224796",
          "CSAFPID-224795",
          "CSAFPID-220326",
          "CSAFPID-764734",
          "CSAFPID-40293",
          "CSAFPID-220167",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764736",
          "CSAFPID-764737",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-704412",
          "CSAFPID-704411",
          "CSAFPID-704410",
          "CSAFPID-219803",
          "CSAFPID-375182",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-219776",
          "CSAFPID-224791",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-764738",
          "CSAFPID-240600",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-764240",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-493443",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-204563",
          "CSAFPID-8984",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-36760",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220057",
            "CSAFPID-220055",
            "CSAFPID-220909",
            "CSAFPID-45184",
            "CSAFPID-45182",
            "CSAFPID-220559",
            "CSAFPID-220558",
            "CSAFPID-220327",
            "CSAFPID-220325",
            "CSAFPID-219838",
            "CSAFPID-220056",
            "CSAFPID-223511",
            "CSAFPID-216017",
            "CSAFPID-220889",
            "CSAFPID-220918",
            "CSAFPID-90020",
            "CSAFPID-90015",
            "CSAFPID-220133",
            "CSAFPID-220561",
            "CSAFPID-90021",
            "CSAFPID-220881",
            "CSAFPID-94291",
            "CSAFPID-220910",
            "CSAFPID-220324",
            "CSAFPID-224796",
            "CSAFPID-224795",
            "CSAFPID-220326",
            "CSAFPID-764734",
            "CSAFPID-40293",
            "CSAFPID-220167",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764736",
            "CSAFPID-764737",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-704412",
            "CSAFPID-704411",
            "CSAFPID-704410",
            "CSAFPID-219803",
            "CSAFPID-375182",
            "CSAFPID-342803",
            "CSAFPID-1266",
            "CSAFPID-219776",
            "CSAFPID-224791",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-764738",
            "CSAFPID-240600",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-764240",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-493443",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-204563",
            "CSAFPID-8984",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2023-2953",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673391",
          "CSAFPID-1673392",
          "CSAFPID-1673393",
          "CSAFPID-1673394",
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-2953",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673391",
            "CSAFPID-1673392",
            "CSAFPID-1673393",
            "CSAFPID-1673394",
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3635",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "other",
          "text": "Signed to Unsigned Conversion Error",
          "title": "CWE-195"
        },
        {
          "category": "other",
          "text": "Uncaught Exception",
          "title": "CWE-248"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-94291",
          "CSAFPID-40293",
          "CSAFPID-204622",
          "CSAFPID-1265",
          "CSAFPID-1261",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-1673399",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-219909",
          "CSAFPID-220558",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-240600",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611401",
          "CSAFPID-611406",
          "CSAFPID-611407",
          "CSAFPID-611408",
          "CSAFPID-611413",
          "CSAFPID-611595",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-219803",
          "CSAFPID-219838",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-342803",
          "CSAFPID-614513",
          "CSAFPID-614514",
          "CSAFPID-614515",
          "CSAFPID-614516",
          "CSAFPID-614517",
          "CSAFPID-618156",
          "CSAFPID-643776",
          "CSAFPID-764237",
          "CSAFPID-764238",
          "CSAFPID-764239",
          "CSAFPID-764240",
          "CSAFPID-764241",
          "CSAFPID-764242",
          "CSAFPID-764243",
          "CSAFPID-764247",
          "CSAFPID-764248",
          "CSAFPID-764249",
          "CSAFPID-816346",
          "CSAFPID-816347",
          "CSAFPID-816348",
          "CSAFPID-816349",
          "CSAFPID-816350",
          "CSAFPID-816351",
          "CSAFPID-816352",
          "CSAFPID-816353",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816776",
          "CSAFPID-816777",
          "CSAFPID-816778",
          "CSAFPID-816779",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-764735",
          "CSAFPID-764738",
          "CSAFPID-912073",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-912102",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3635",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-94291",
            "CSAFPID-40293",
            "CSAFPID-204622",
            "CSAFPID-1265",
            "CSAFPID-1261",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-1673399",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-219909",
            "CSAFPID-220558",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-240600",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611401",
            "CSAFPID-611406",
            "CSAFPID-611407",
            "CSAFPID-611408",
            "CSAFPID-611413",
            "CSAFPID-611595",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-219803",
            "CSAFPID-219838",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-342803",
            "CSAFPID-614513",
            "CSAFPID-614514",
            "CSAFPID-614515",
            "CSAFPID-614516",
            "CSAFPID-614517",
            "CSAFPID-618156",
            "CSAFPID-643776",
            "CSAFPID-764237",
            "CSAFPID-764238",
            "CSAFPID-764239",
            "CSAFPID-764240",
            "CSAFPID-764241",
            "CSAFPID-764242",
            "CSAFPID-764243",
            "CSAFPID-764247",
            "CSAFPID-764248",
            "CSAFPID-764249",
            "CSAFPID-816346",
            "CSAFPID-816347",
            "CSAFPID-816348",
            "CSAFPID-816349",
            "CSAFPID-816350",
            "CSAFPID-816351",
            "CSAFPID-816352",
            "CSAFPID-816353",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816776",
            "CSAFPID-816777",
            "CSAFPID-816778",
            "CSAFPID-816779",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-764735",
            "CSAFPID-764738",
            "CSAFPID-912073",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-912102",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242"
          ]
        }
      ],
      "title": "CVE-2023-3635"
    },
    {
      "cve": "CVE-2023-4043",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-219838",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816346",
          "CSAFPID-816776",
          "CSAFPID-816348",
          "CSAFPID-816777",
          "CSAFPID-816347",
          "CSAFPID-94291",
          "CSAFPID-816778",
          "CSAFPID-614517",
          "CSAFPID-816779",
          "CSAFPID-816349",
          "CSAFPID-40293",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816353",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816352",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-342804",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-224793",
          "CSAFPID-816794",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-219803",
          "CSAFPID-219909",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-240600",
          "CSAFPID-342803",
          "CSAFPID-611595",
          "CSAFPID-764738",
          "CSAFPID-816351",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-219826",
          "CSAFPID-764739",
          "CSAFPID-912073",
          "CSAFPID-912558"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4043",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-219838",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816346",
            "CSAFPID-816776",
            "CSAFPID-816348",
            "CSAFPID-816777",
            "CSAFPID-816347",
            "CSAFPID-94291",
            "CSAFPID-816778",
            "CSAFPID-614517",
            "CSAFPID-816779",
            "CSAFPID-816349",
            "CSAFPID-40293",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816353",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816352",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-342804",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-224793",
            "CSAFPID-816794",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-219803",
            "CSAFPID-219909",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-240600",
            "CSAFPID-342803",
            "CSAFPID-611595",
            "CSAFPID-764738",
            "CSAFPID-816351",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-219826",
            "CSAFPID-764739",
            "CSAFPID-912073",
            "CSAFPID-912558"
          ]
        }
      ],
      "title": "CVE-2023-4043"
    },
    {
      "cve": "CVE-2023-5685",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5685",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-6597",
      "cwe": {
        "id": "CWE-61",
        "name": "UNIX Symbolic Link (Symlink) Following"
      },
      "notes": [
        {
          "category": "other",
          "text": "UNIX Symbolic Link (Symlink) Following",
          "title": "CWE-61"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6597",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6816",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-6816"
    },
    {
      "cve": "CVE-2023-38408",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-45182",
          "CSAFPID-40293",
          "CSAFPID-611406",
          "CSAFPID-764237",
          "CSAFPID-220558",
          "CSAFPID-764238",
          "CSAFPID-764239",
          "CSAFPID-614513",
          "CSAFPID-643776",
          "CSAFPID-611387",
          "CSAFPID-618156",
          "CSAFPID-614516",
          "CSAFPID-614515",
          "CSAFPID-614514",
          "CSAFPID-764240",
          "CSAFPID-94291",
          "CSAFPID-611401",
          "CSAFPID-614517",
          "CSAFPID-764241",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-764243",
          "CSAFPID-342804",
          "CSAFPID-611408",
          "CSAFPID-611407",
          "CSAFPID-764247",
          "CSAFPID-764248",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-611595",
          "CSAFPID-764249",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-45182",
            "CSAFPID-40293",
            "CSAFPID-611406",
            "CSAFPID-764237",
            "CSAFPID-220558",
            "CSAFPID-764238",
            "CSAFPID-764239",
            "CSAFPID-614513",
            "CSAFPID-643776",
            "CSAFPID-611387",
            "CSAFPID-618156",
            "CSAFPID-614516",
            "CSAFPID-614515",
            "CSAFPID-614514",
            "CSAFPID-764240",
            "CSAFPID-94291",
            "CSAFPID-611401",
            "CSAFPID-614517",
            "CSAFPID-764241",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-764243",
            "CSAFPID-342804",
            "CSAFPID-611408",
            "CSAFPID-611407",
            "CSAFPID-764247",
            "CSAFPID-764248",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-611595",
            "CSAFPID-764249",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-43642",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-40293",
          "CSAFPID-1265",
          "CSAFPID-1261",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-1673395",
          "CSAFPID-94291",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-204622",
          "CSAFPID-219803",
          "CSAFPID-219838",
          "CSAFPID-219909",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-224793",
          "CSAFPID-240600",
          "CSAFPID-342793",
          "CSAFPID-342803",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-611595",
          "CSAFPID-614517",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764738",
          "CSAFPID-816346",
          "CSAFPID-816347",
          "CSAFPID-816348",
          "CSAFPID-816349",
          "CSAFPID-816350",
          "CSAFPID-816351",
          "CSAFPID-816352",
          "CSAFPID-816353",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816776",
          "CSAFPID-816777",
          "CSAFPID-816778",
          "CSAFPID-816779",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-43642",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-40293",
            "CSAFPID-1265",
            "CSAFPID-1261",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-1673395",
            "CSAFPID-94291",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-204622",
            "CSAFPID-219803",
            "CSAFPID-219838",
            "CSAFPID-219909",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-224793",
            "CSAFPID-240600",
            "CSAFPID-342793",
            "CSAFPID-342803",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-611595",
            "CSAFPID-614517",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764738",
            "CSAFPID-816346",
            "CSAFPID-816347",
            "CSAFPID-816348",
            "CSAFPID-816349",
            "CSAFPID-816350",
            "CSAFPID-816351",
            "CSAFPID-816352",
            "CSAFPID-816353",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816776",
            "CSAFPID-816777",
            "CSAFPID-816778",
            "CSAFPID-816779",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797"
          ]
        }
      ],
      "title": "CVE-2023-43642"
    },
    {
      "cve": "CVE-2023-46136",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673411",
          "CSAFPID-912549",
          "CSAFPID-1673412",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-220132",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673416",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46136",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673411",
            "CSAFPID-912549",
            "CSAFPID-1673412",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-220132",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673416",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-219838",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816346",
          "CSAFPID-816776",
          "CSAFPID-816348",
          "CSAFPID-816777",
          "CSAFPID-816347",
          "CSAFPID-94291",
          "CSAFPID-816778",
          "CSAFPID-614517",
          "CSAFPID-816779",
          "CSAFPID-816349",
          "CSAFPID-40293",
          "CSAFPID-764242",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816353",
          "CSAFPID-816786",
          "CSAFPID-816352",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-219803",
          "CSAFPID-816351",
          "CSAFPID-611595",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673417",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-90016",
          "CSAFPID-764826",
          "CSAFPID-345038",
          "CSAFPID-912079",
          "CSAFPID-220132",
          "CSAFPID-93781",
          "CSAFPID-345039",
          "CSAFPID-912080",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-611413",
          "CSAFPID-240600",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-1503601",
          "CSAFPID-1503602"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-219838",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816346",
            "CSAFPID-816776",
            "CSAFPID-816348",
            "CSAFPID-816777",
            "CSAFPID-816347",
            "CSAFPID-94291",
            "CSAFPID-816778",
            "CSAFPID-614517",
            "CSAFPID-816779",
            "CSAFPID-816349",
            "CSAFPID-40293",
            "CSAFPID-764242",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816353",
            "CSAFPID-816786",
            "CSAFPID-816352",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-219803",
            "CSAFPID-816351",
            "CSAFPID-611595",
            "CSAFPID-342803",
            "CSAFPID-1266",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673417",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-90016",
            "CSAFPID-764826",
            "CSAFPID-345038",
            "CSAFPID-912079",
            "CSAFPID-220132",
            "CSAFPID-93781",
            "CSAFPID-345039",
            "CSAFPID-912080",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-611413",
            "CSAFPID-240600",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-1503601",
            "CSAFPID-1503602"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51775",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650751",
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51775",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650751",
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2023-51775"
    },
    {
      "cve": "CVE-2023-52428",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912073",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912102",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52428",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912073",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912102",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2023-52428"
    },
    {
      "cve": "CVE-2024-0450",
      "cwe": {
        "id": "CWE-450",
        "name": "Multiple Interpretations of UI Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Multiple Interpretations of UI Input",
          "title": "CWE-450"
        },
        {
          "category": "other",
          "text": "Asymmetric Resource Consumption (Amplification)",
          "title": "CWE-405"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0450",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673399",
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673399",
            "CSAFPID-1673391",
            "CSAFPID-1673394",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-4577",
      "cwe": {
        "id": "CWE-88",
        "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
          "title": "CWE-88"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650731",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4577",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650731",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-4577"
    },
    {
      "cve": "CVE-2024-4603",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4603",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673391",
            "CSAFPID-1673394",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-5585",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Encoding or Escaping of Output",
          "title": "CWE-116"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
          "title": "CWE-88"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5585",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2024-5585"
    },
    {
      "cve": "CVE-2024-5971",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673399",
          "CSAFPID-1673526",
          "CSAFPID-1673413",
          "CSAFPID-1673396",
          "CSAFPID-1673415",
          "CSAFPID-1673501",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5971",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673399",
            "CSAFPID-1673526",
            "CSAFPID-1673413",
            "CSAFPID-1673396",
            "CSAFPID-1673415",
            "CSAFPID-1673501",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-5971"
    },
    {
      "cve": "CVE-2024-6162",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673526",
          "CSAFPID-1673399",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6162",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673526",
            "CSAFPID-1673399",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-6162"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503595",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6387",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7264",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-22020",
      "product_status": {
        "known_affected": [
          "CSAFPID-912101",
          "CSAFPID-1673473",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22020",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912101",
            "CSAFPID-1673473",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-22020"
    },
    {
      "cve": "CVE-2024-22201",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673475",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-219776",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-224795",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22201",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673475",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-219776",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-224795",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-22201"
    },
    {
      "cve": "CVE-2024-22257",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-764237",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-342804",
          "CSAFPID-912080",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22257",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-764237",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-342804",
            "CSAFPID-912080",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-22257"
    },
    {
      "cve": "CVE-2024-22262",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
          "title": "CWE-601"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650820",
          "CSAFPID-1650751",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22262",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650820",
            "CSAFPID-1650751",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-22262"
    },
    {
      "cve": "CVE-2024-23672",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incomplete Cleanup",
          "title": "CWE-459"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650826",
          "CSAFPID-1650731",
          "CSAFPID-1673382",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-614517",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23672",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650826",
            "CSAFPID-1650731",
            "CSAFPID-1673382",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-614517",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-23807",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650734",
          "CSAFPID-1650830",
          "CSAFPID-1650777",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-1650778",
          "CSAFPID-41182",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23807",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650734",
            "CSAFPID-1650830",
            "CSAFPID-1650777",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-1650778",
            "CSAFPID-41182",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-23807"
    },
    {
      "cve": "CVE-2024-24549",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650826",
          "CSAFPID-1673382",
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-342804",
          "CSAFPID-912080",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24549",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650826",
            "CSAFPID-1673382",
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-342804",
            "CSAFPID-912080",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650751",
          "CSAFPID-1650752",
          "CSAFPID-1673481",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-614517",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25062",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650751",
            "CSAFPID-1650752",
            "CSAFPID-1673481",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-614517",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-25638",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        },
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25638",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-26308",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26308",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-26308"
    },
    {
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Detection of Error Condition Without Action",
          "title": "CWE-390"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1673485",
          "CSAFPID-1673393",
          "CSAFPID-1673394",
          "CSAFPID-1673389",
          "CSAFPID-1672767",
          "CSAFPID-1673391",
          "CSAFPID-1673392",
          "CSAFPID-1673415",
          "CSAFPID-1673390",
          "CSAFPID-1673413",
          "CSAFPID-1673395",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28182",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1673485",
            "CSAFPID-1673393",
            "CSAFPID-1673394",
            "CSAFPID-1673389",
            "CSAFPID-1672767",
            "CSAFPID-1673391",
            "CSAFPID-1673392",
            "CSAFPID-1673415",
            "CSAFPID-1673390",
            "CSAFPID-1673413",
            "CSAFPID-1673395",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28849",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673414",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28849",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673414",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-28849"
    },
    {
      "cve": "CVE-2024-29025",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673494",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673494",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29133",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650820",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29133",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650820",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29133"
    },
    {
      "cve": "CVE-2024-29736",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673399",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673399",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-29736"
    },
    {
      "cve": "CVE-2024-29857",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673413",
          "CSAFPID-1673415",
          "CSAFPID-1673501",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29857",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673413",
            "CSAFPID-1673415",
            "CSAFPID-1673501",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29857"
    },
    {
      "cve": "CVE-2024-30251",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912079",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-30251",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912079",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-30251"
    },
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31080",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31744",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673392",
          "CSAFPID-1673393",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31744",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673392",
            "CSAFPID-1673393",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-31744"
    },
    {
      "cve": "CVE-2024-32760",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-32760",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-32760"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34750",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673481",
          "CSAFPID-1503596",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34750",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673481",
            "CSAFPID-1503596",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-34750"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-1673399",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-1673399",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38816",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-38816"
    },
    {
      "cve": "CVE-2024-39689",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1673392",
          "CSAFPID-1673393"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39689",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1673392",
            "CSAFPID-1673393"
          ]
        }
      ],
      "title": "CVE-2024-39689"
    },
    {
      "cve": "CVE-2024-40898",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673516",
          "CSAFPID-1673411",
          "CSAFPID-1673412",
          "CSAFPID-1650731",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40898",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673516",
            "CSAFPID-1673411",
            "CSAFPID-1673412",
            "CSAFPID-1650731",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-41817",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1674625"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41817",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1674625"
          ]
        }
      ],
      "title": "CVE-2024-41817"
    },
    {
      "cve": "CVE-2024-43044",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673411",
          "CSAFPID-1673412",
          "CSAFPID-1673413",
          "CSAFPID-1673396",
          "CSAFPID-1673392",
          "CSAFPID-1673494",
          "CSAFPID-1673393",
          "CSAFPID-1673415",
          "CSAFPID-1673416",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43044",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673411",
            "CSAFPID-1673412",
            "CSAFPID-1673413",
            "CSAFPID-1673396",
            "CSAFPID-1673392",
            "CSAFPID-1673494",
            "CSAFPID-1673393",
            "CSAFPID-1673415",
            "CSAFPID-1673416",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1673399",
          "CSAFPID-1650731",
          "CSAFPID-1673517",
          "CSAFPID-1673396",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1673399",
            "CSAFPID-1650731",
            "CSAFPID-1673517",
            "CSAFPID-1673396",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    }
  ]
}
  ncsc-2024-0414
Vulnerability from csaf_ncscnl
Notes
{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE"
      }
    },
    "lang": "nl",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n    NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n    NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n    This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
      },
      {
        "category": "description",
        "text": "Oracle heeft kwetsbaarheden verholpen in diverse Communications producten en systemen.",
        "title": "Feiten"
      },
      {
        "category": "description",
        "text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om aanvallen uit te voeren die kunnen leiden tot de volgende categorie\u00ebn schade:\n\n- Denial-of-Service (DoS)\n- Manipuleren van gegevens\n- Uitvoer van willekeurige code (Gebruikersrechten)\n- Uitvoer van willekeurige code (Administratorrechten)\n- Toegang tot gevoelige gegevens",
        "title": "Interpretaties"
      },
      {
        "category": "description",
        "text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
        "title": "Oplossingen"
      },
      {
        "category": "general",
        "text": "medium",
        "title": "Kans"
      },
      {
        "category": "general",
        "text": "high",
        "title": "Schade"
      },
      {
        "category": "general",
        "text": "Heap-based Buffer Overflow",
        "title": "CWE-122"
      },
      {
        "category": "general",
        "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
        "title": "CWE-835"
      },
      {
        "category": "general",
        "text": "Improper Input Validation",
        "title": "CWE-20"
      },
      {
        "category": "general",
        "text": "Return of Pointer Value Outside of Expected Range",
        "title": "CWE-466"
      },
      {
        "category": "general",
        "text": "Unchecked Input for Loop Condition",
        "title": "CWE-606"
      },
      {
        "category": "general",
        "text": "Detection of Error Condition Without Action",
        "title": "CWE-390"
      },
      {
        "category": "general",
        "text": "Asymmetric Resource Consumption (Amplification)",
        "title": "CWE-405"
      },
      {
        "category": "general",
        "text": "Truncation of Security-relevant Information",
        "title": "CWE-222"
      },
      {
        "category": "general",
        "text": "Signal Handler Race Condition",
        "title": "CWE-364"
      },
      {
        "category": "general",
        "text": "Multiple Interpretations of UI Input",
        "title": "CWE-450"
      },
      {
        "category": "general",
        "text": "Improper Handling of Length Parameter Inconsistency",
        "title": "CWE-130"
      },
      {
        "category": "general",
        "text": "Missing Release of Resource after Effective Lifetime",
        "title": "CWE-772"
      },
      {
        "category": "general",
        "text": "Incorrect Resource Transfer Between Spheres",
        "title": "CWE-669"
      },
      {
        "category": "general",
        "text": "Buffer Over-read",
        "title": "CWE-126"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
        "title": "CWE-88"
      },
      {
        "category": "general",
        "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
        "title": "CWE-349"
      },
      {
        "category": "general",
        "text": "Improper Handling of Exceptional Conditions",
        "title": "CWE-755"
      },
      {
        "category": "general",
        "text": "Excessive Iteration",
        "title": "CWE-834"
      },
      {
        "category": "general",
        "text": "Inefficient Algorithmic Complexity",
        "title": "CWE-407"
      },
      {
        "category": "general",
        "text": "Improper Check for Unusual or Exceptional Conditions",
        "title": "CWE-754"
      },
      {
        "category": "general",
        "text": "Improper Check or Handling of Exceptional Conditions",
        "title": "CWE-703"
      },
      {
        "category": "general",
        "text": "Uncontrolled Search Path Element",
        "title": "CWE-427"
      },
      {
        "category": "general",
        "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
        "title": "CWE-601"
      },
      {
        "category": "general",
        "text": "Signed to Unsigned Conversion Error",
        "title": "CWE-195"
      },
      {
        "category": "general",
        "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
        "title": "CWE-444"
      },
      {
        "category": "general",
        "text": "Improper Encoding or Escaping of Output",
        "title": "CWE-116"
      },
      {
        "category": "general",
        "text": "Insufficient Verification of Data Authenticity",
        "title": "CWE-345"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
        "title": "CWE-77"
      },
      {
        "category": "general",
        "text": "Integer Overflow or Wraparound",
        "title": "CWE-190"
      },
      {
        "category": "general",
        "text": "UNIX Symbolic Link (Symlink) Following",
        "title": "CWE-61"
      },
      {
        "category": "general",
        "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
        "title": "CWE-362"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Read",
        "title": "CWE-125"
      },
      {
        "category": "general",
        "text": "Improper Resource Shutdown or Release",
        "title": "CWE-404"
      },
      {
        "category": "general",
        "text": "Improper Access Control",
        "title": "CWE-284"
      },
      {
        "category": "general",
        "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
        "title": "CWE-119"
      },
      {
        "category": "general",
        "text": "Use After Free",
        "title": "CWE-416"
      },
      {
        "category": "general",
        "text": "Missing Release of Memory after Effective Lifetime",
        "title": "CWE-401"
      },
      {
        "category": "general",
        "text": "NULL Pointer Dereference",
        "title": "CWE-476"
      },
      {
        "category": "general",
        "text": "Incomplete Cleanup",
        "title": "CWE-459"
      },
      {
        "category": "general",
        "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
        "title": "CWE-94"
      },
      {
        "category": "general",
        "text": "Uncontrolled Resource Consumption",
        "title": "CWE-400"
      },
      {
        "category": "general",
        "text": "Allocation of Resources Without Limits or Throttling",
        "title": "CWE-770"
      },
      {
        "category": "general",
        "text": "Uncaught Exception",
        "title": "CWE-248"
      },
      {
        "category": "general",
        "text": "Uncontrolled Recursion",
        "title": "CWE-674"
      },
      {
        "category": "general",
        "text": "Server-Side Request Forgery (SSRF)",
        "title": "CWE-918"
      },
      {
        "category": "general",
        "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
        "title": "CWE-22"
      },
      {
        "category": "general",
        "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
        "title": "CWE-78"
      },
      {
        "category": "general",
        "text": "Out-of-bounds Write",
        "title": "CWE-787"
      },
      {
        "category": "general",
        "text": "Exposure of Sensitive Information to an Unauthorized Actor",
        "title": "CWE-200"
      }
    ],
    "publisher": {
      "category": "coordinator",
      "contact_details": "cert@ncsc.nl",
      "name": "Nationaal Cyber Security Centrum",
      "namespace": "https://www.ncsc.nl/"
    },
    "references": [
      {
        "category": "external",
        "summary": "Reference - cveprojectv5; hkcert; nvd; oracle; redhat",
        "url": "https://www.oracle.com/security-alerts/cpuoct2024.html"
      }
    ],
    "title": "Kwetsbaarheden verholpen in Oracle Communications",
    "tracking": {
      "current_release_date": "2024-10-17T13:17:52.103171Z",
      "id": "NCSC-2024-0414",
      "initial_release_date": "2024-10-17T13:17:52.103171Z",
      "revision_history": [
        {
          "date": "2024-10-17T13:17:52.103171Z",
          "number": "0",
          "summary": "Initiele versie"
        }
      ],
      "status": "final",
      "version": "1.0.0"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635313",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635305",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635311",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635312",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635323",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670430",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674632",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635320",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670439",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670429",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670435",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670431",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670436",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670432",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635321",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635310",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635318",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674640",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674642",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670434",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674639",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635314",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674638",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674637",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635306",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635307",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635319",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670438",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635315",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670433",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674641",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674636",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1670437",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674631",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1674634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635308",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications",
            "product": {
              "name": "communications",
              "product_id": "CSAFPID-1635309",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications__10.4.0.4",
            "product": {
              "name": "communications__10.4.0.4",
              "product_id": "CSAFPID-1674629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.2",
            "product": {
              "name": "communications___23.4.2",
              "product_id": "CSAFPID-1670442",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.3",
            "product": {
              "name": "communications___23.4.3",
              "product_id": "CSAFPID-1635325",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.4",
            "product": {
              "name": "communications___23.4.4",
              "product_id": "CSAFPID-1635326",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.5",
            "product": {
              "name": "communications___23.4.5",
              "product_id": "CSAFPID-1674645",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___23.4.6",
            "product": {
              "name": "communications___23.4.6",
              "product_id": "CSAFPID-1674646",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___24.2.0",
            "product": {
              "name": "communications___24.2.0",
              "product_id": "CSAFPID-1674644",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___7.2.1.0.0",
            "product": {
              "name": "communications___7.2.1.0.0",
              "product_id": "CSAFPID-1670441",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.6",
            "product": {
              "name": "communications___8.6.0.6",
              "product_id": "CSAFPID-1635327",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___8.6.0.8",
            "product": {
              "name": "communications___8.6.0.8",
              "product_id": "CSAFPID-1635328",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.2",
            "product": {
              "name": "communications___9.0.2",
              "product_id": "CSAFPID-1670440",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.0.3",
            "product": {
              "name": "communications___9.0.3",
              "product_id": "CSAFPID-1635329",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications___9.1.1.8.0",
            "product": {
              "name": "communications___9.1.1.8.0",
              "product_id": "CSAFPID-1674643",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674621",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674618",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674619",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674617",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications",
            "product": {
              "name": "communications_applications",
              "product_id": "CSAFPID-1674620",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___12.0.6.0.0",
            "product": {
              "name": "communications_applications___12.0.6.0.0",
              "product_id": "CSAFPID-1674627",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___5.5.22",
            "product": {
              "name": "communications_applications___5.5.22",
              "product_id": "CSAFPID-1674626",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.3",
            "product": {
              "name": "communications_applications___6.0.3",
              "product_id": "CSAFPID-1674628",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.4",
            "product": {
              "name": "communications_applications___6.0.4",
              "product_id": "CSAFPID-1674624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_applications___6.0.5",
            "product": {
              "name": "communications_applications___6.0.5",
              "product_id": "CSAFPID-1674625",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-204629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-1673475",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.4.3.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_asap",
            "product": {
              "name": "communications_asap",
              "product_id": "CSAFPID-816792",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-764735",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-1650734",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4.0-12.0.0.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-204639",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-204627",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-816793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management",
            "product": {
              "name": "communications_billing_and_revenue_management",
              "product_id": "CSAFPID-912557",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
            "product": {
              "name": "communications_billing_and_revenue_management__-_elastic_charging_engine",
              "product_id": "CSAFPID-219835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management__-_elastic_charging_engine:12.0.0.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-764247",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3.0.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209549",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-41194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-1650820",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-765241",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-209550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-498607",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12:0.0.5.0:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_brm_-_elastic_charging_engine",
            "product": {
              "name": "communications_brm_-_elastic_charging_engine",
              "product_id": "CSAFPID-912556",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_calendar_server",
            "product": {
              "name": "communications_calendar_server",
              "product_id": "CSAFPID-764736",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_calendar_server:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_calendar_server",
            "product": {
              "name": "communications_calendar_server",
              "product_id": "CSAFPID-220190",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_calendar_server:8.0.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_configuration_console",
            "product": {
              "name": "communications_cloud_native_configuration_console",
              "product_id": "CSAFPID-391501",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_configuration_console",
            "product": {
              "name": "communications_cloud_native_configuration_console",
              "product_id": "CSAFPID-440102",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_configuration_console:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-89545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-180215",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-180197",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-41516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-41515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220057",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220055",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-220909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816765",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816766",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-816767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1503577",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673416",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673412",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_automated_test_suite",
            "product": {
              "name": "communications_cloud_native_core_automated_test_suite",
              "product_id": "CSAFPID-1673411",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-764237",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-2045",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-40612",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-608629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-93784",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1899",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-41111",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1685",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-493445",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-294401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.2.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-220547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-764824",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-220459",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45184",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-45181",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611405",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.1.7:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611403",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-611404",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1650752",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1673396",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-912066",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_binding_support_function",
            "product": {
              "name": "communications_cloud_native_core_binding_support_function",
              "product_id": "CSAFPID-1503323",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673526",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673391",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_certificate_management",
            "product": {
              "name": "communications_cloud_native_core_certificate_management",
              "product_id": "CSAFPID-1673394",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-165550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-93546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-180195",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-40299",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-187447",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-45186",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-45185",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-220559",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-220558",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-764238",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-764239",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816768",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-816769",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-912085",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1503578",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673389",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_console",
            "product": {
              "name": "communications_cloud_native_core_console",
              "product_id": "CSAFPID-1673390",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673421",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_dbtier",
            "product": {
              "name": "communications_cloud_native_core_dbtier",
              "product_id": "CSAFPID-1673420",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-764825",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:22.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816770",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-816771",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-912068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_data_analytics_function",
            "product": {
              "name": "communications_cloud_native_core_network_data_analytics_function",
              "product_id": "CSAFPID-1503579",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-180201",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-1900",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-760687",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-40947",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-93635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-503534",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-90018",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-220327",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-94290",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-220325",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-614513",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-643776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-816772",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-912076",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_exposure_function",
            "product": {
              "name": "communications_cloud_native_core_network_exposure_function",
              "product_id": "CSAFPID-1503580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40613",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.10.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-2044",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:1.9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40301",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-180194",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-449747",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-40298",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-223527",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-449746",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-503493",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-260394",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-219838",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-611387",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-618156",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-816773",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912101",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1673473",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0-24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-1503581",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912539",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912540",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912541",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912542",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_function_cloud_native_environment",
            "product": {
              "name": "communications_cloud_native_core_network_function_cloud_native_environment",
              "product_id": "CSAFPID-912543",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-40611",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-40609",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:1.15.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-180198",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-41112",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-41110",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-760688",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-493444",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-93633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220056",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-223511",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-216017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220889",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614516",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-220918",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-614514",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816346",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912077",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1503322",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-1673415",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-816775",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_repository_function",
            "product": {
              "name": "communications_cloud_native_core_network_repository_function",
              "product_id": "CSAFPID-912544",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-40608",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:1.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-180199",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-41113",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-260395",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-260393",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816348",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-912545",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816347",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-1673494",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-1673501",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_network_slice_selection_function",
            "product": {
              "name": "communications_cloud_native_core_network_slice_selection_function",
              "product_id": "CSAFPID-816777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-764240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-220468",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-2310",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-93547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-180200",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-180193",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1898",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-93636",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-90020",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-90015",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-220133",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1650751",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-1673395",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-912069",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_policy",
            "product": {
              "name": "communications_cloud_native_core_policy",
              "product_id": "CSAFPID-765371",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:all_supported_s:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-180216",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-180202",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-40300",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-93653",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-40949",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-642000",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-93634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220561",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-90021",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-94292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-218028",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220881",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:22.4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-94291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220910",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-220324",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-611401",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-816778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-614517",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912547",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673392",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1503582",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-1673393",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_security_edge_protection_proxy",
            "product": {
              "name": "communications_cloud_native_core_security_edge_protection_proxy",
              "product_id": "CSAFPID-912546",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-40610",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-611587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-642002",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.2.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-493443",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-642001",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-224796",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-224795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912548",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912102",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-912549",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503583",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503584",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1503585",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_service_communication_proxy",
            "product": {
              "name": "communications_cloud_native_core_service_communication_proxy",
              "product_id": "CSAFPID-1672767",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-180217",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:1.15.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-180196",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-165576",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-40297",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764899",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-589926",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-179780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.2.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-40948",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-589925",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-179779",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.3.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-90019",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-90016",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-220326",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-764241",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912078",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816349",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-912550",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1503587",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-1673399",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_cloud_native_core_unified_data_repository",
            "product": {
              "name": "communications_cloud_native_core_unified_data_repository",
              "product_id": "CSAFPID-816779",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-764737",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-224787",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_contacts_server",
            "product": {
              "name": "communications_contacts_server",
              "product_id": "CSAFPID-220189",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_contacts_server:8.0.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-764827",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:7.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server",
            "product": {
              "name": "communications_converged_application_server",
              "product_id": "CSAFPID-764828",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server_-_service_controller",
            "product": {
              "name": "communications_converged_application_server_-_service_controller",
              "product_id": "CSAFPID-764734",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_application_server_-_service_controller",
            "product": {
              "name": "communications_converged_application_server_-_service_controller",
              "product_id": "CSAFPID-426842",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_application_server_-_service_controller:6.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503599",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_converged_charging_system",
            "product": {
              "name": "communications_converged_charging_system",
              "product_id": "CSAFPID-1503600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-345031",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-204635",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-764833",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-224793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergence",
            "product": {
              "name": "communications_convergence",
              "product_id": "CSAFPID-816794",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-342793",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1650777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1265",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-764248",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-816350",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_convergent_charging_controller",
            "product": {
              "name": "communications_convergent_charging_controller",
              "product_id": "CSAFPID-1261",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-110244",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-110242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-93777",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:8.45:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-1672764",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_core_session_manager",
            "product": {
              "name": "communications_core_session_manager",
              "product_id": "CSAFPID-93772",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.15:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_data_model",
            "product": {
              "name": "communications_data_model",
              "product_id": "CSAFPID-764902",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_data_model:12.2.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-765372",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-342799",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704412",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704411",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-165544",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-704410",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_design_studio",
            "product": {
              "name": "communications_design_studio",
              "product_id": "CSAFPID-41183",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_design_studio:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_intelligence_hub",
            "product": {
              "name": "communications_diameter_intelligence_hub",
              "product_id": "CSAFPID-342802",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_intelligence_hub",
            "product": {
              "name": "communications_diameter_intelligence_hub",
              "product_id": "CSAFPID-764829",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_intelligence_hub:8.2.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1503588",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1892",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1891",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1888",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1887",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1889",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1884",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1885",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1882",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1881",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1883",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1879",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1880",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-40293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1650826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-1650830",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4-8.6.0.8:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-611413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912551",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_diameter_signaling_router",
            "product": {
              "name": "communications_diameter_signaling_router",
              "product_id": "CSAFPID-912552",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_application_processor",
            "product": {
              "name": "communications_eagle_application_processor",
              "product_id": "CSAFPID-1673417",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:17.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_application_processor",
            "product": {
              "name": "communications_eagle_application_processor",
              "product_id": "CSAFPID-765369",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_application_processor:all_supported_s:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503316",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-1503317",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_element_management_system",
            "product": {
              "name": "communications_eagle_element_management_system",
              "product_id": "CSAFPID-204528",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_ftp_table_base_retrieval",
            "product": {
              "name": "communications_eagle_ftp_table_base_retrieval",
              "product_id": "CSAFPID-204623",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_ftp_table_base_retrieval:4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_lnp_application_processor",
            "product": {
              "name": "communications_eagle_lnp_application_processor",
              "product_id": "CSAFPID-352633",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_lnp_application_processor",
            "product": {
              "name": "communications_eagle_lnp_application_processor",
              "product_id": "CSAFPID-352632",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_lnp_application_processor:10.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_software",
            "product": {
              "name": "communications_eagle_software",
              "product_id": "CSAFPID-765366",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_eagle_software",
            "product": {
              "name": "communications_eagle_software",
              "product_id": "CSAFPID-765365",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_eagle_software:46.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_elastic_charging_engine",
            "product": {
              "name": "communications_elastic_charging_engine",
              "product_id": "CSAFPID-764834",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_elastic_charging_engine:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-764242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204580",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-9226",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-9070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-8845",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204624",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-2286",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-204464",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-345038",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-93629",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-611422",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-93630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_element_manager",
            "product": {
              "name": "communications_element_manager",
              "product_id": "CSAFPID-816780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_evolved_communications_application_server",
            "product": {
              "name": "communications_evolved_communications_application_server",
              "product_id": "CSAFPID-204645",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_evolved_communications_application_server:7.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-816782",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_fraud_monitor",
            "product": {
              "name": "communications_fraud_monitor",
              "product_id": "CSAFPID-912553",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-207586",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-234306",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-219803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_instant_messaging_server",
            "product": {
              "name": "communications_instant_messaging_server",
              "product_id": "CSAFPID-387664",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_interactive_session_recorder",
            "product": {
              "name": "communications_interactive_session_recorder",
              "product_id": "CSAFPID-1893",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_interactive_session_recorder:6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-204622",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_ip_service_activator",
            "product": {
              "name": "communications_ip_service_activator",
              "product_id": "CSAFPID-219909",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_lsms",
            "product": {
              "name": "communications_lsms",
              "product_id": "CSAFPID-1673065",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_lsms:14.0.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-764835",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.20.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-375182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.21.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-816351",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_messaging_server",
            "product": {
              "name": "communications_messaging_server",
              "product_id": "CSAFPID-41182",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_metasolv_solution",
            "product": {
              "name": "communications_metasolv_solution",
              "product_id": "CSAFPID-611595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_metasolv_solution",
            "product": {
              "name": "communications_metasolv_solution",
              "product_id": "CSAFPID-226017",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-220167",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816353",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-764243",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816352",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503589",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1503590",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-1673414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816783",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816786",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816784",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816787",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816785",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_analytics_data_director",
            "product": {
              "name": "communications_network_analytics_data_director",
              "product_id": "CSAFPID-816788",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-342803",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1650778",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-1266",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-764249",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-816354",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_charging_and_control",
            "product": {
              "name": "communications_network_charging_and_control",
              "product_id": "CSAFPID-204563",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-220125",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-245244",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-219776",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_network_integrity",
            "product": {
              "name": "communications_network_integrity",
              "product_id": "CSAFPID-204554",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_offline_mediation_controller",
            "product": {
              "name": "communications_offline_mediation_controller",
              "product_id": "CSAFPID-765242",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-9489",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-110249",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:4.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-93781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-220132",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_operations_monitor",
            "product": {
              "name": "communications_operations_monitor",
              "product_id": "CSAFPID-912079",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-224791",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-219898",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-224790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-221118",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-179774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_order_and_service_management",
            "product": {
              "name": "communications_order_and_service_management",
              "product_id": "CSAFPID-1673496",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence",
            "product": {
              "name": "communications_performance_intelligence",
              "product_id": "CSAFPID-1503591",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center",
            "product": {
              "name": "communications_performance_intelligence_center",
              "product_id": "CSAFPID-1673485",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center:prior_to_10.4.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-765367",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-765368",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_performance_intelligence_center__pic__software",
            "product": {
              "name": "communications_performance_intelligence_center__pic__software",
              "product_id": "CSAFPID-764830",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_performance_intelligence_center__pic__software:10.4.0.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-573035",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.5.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-45192",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-611406",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816789",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_policy_management",
            "product": {
              "name": "communications_policy_management",
              "product_id": "CSAFPID-816790",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-764738",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-204595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-204590",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_pricing_design_center",
            "product": {
              "name": "communications_pricing_design_center",
              "product_id": "CSAFPID-816355",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503601",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816359",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816358",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816357",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-912558",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-1503602",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816795",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816796",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_service_catalog_and_design",
            "product": {
              "name": "communications_service_catalog_and_design",
              "product_id": "CSAFPID-816797",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_services_gatekeeper",
            "product": {
              "name": "communications_services_gatekeeper",
              "product_id": "CSAFPID-608630",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_services_gatekeeper:7.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503592",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503593",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:8.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1672762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-40291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503594",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_border_controller",
            "product": {
              "name": "communications_session_border_controller",
              "product_id": "CSAFPID-1503595",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-342804",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-704413",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2296",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-166028",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2294",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2292",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2290",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2288",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2282",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2285",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-2279",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-204634",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:8.2.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-345039",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-93628",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-611423",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-93631",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_report_manager",
            "product": {
              "name": "communications_session_report_manager",
              "product_id": "CSAFPID-816791",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-342805",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-704414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:-:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-166027",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2295",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2293",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.1.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2289",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2291",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2287",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2283",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2284",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2280",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-2281",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-220414",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_route_manager",
            "product": {
              "name": "communications_session_route_manager",
              "product_id": "CSAFPID-204607",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_route_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_router",
            "product": {
              "name": "communications_session_router",
              "product_id": "CSAFPID-764780",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_router:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_session_router",
            "product": {
              "name": "communications_session_router",
              "product_id": "CSAFPID-764781",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_session_router:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_subscriber-aware_load_balancer",
            "product": {
              "name": "communications_subscriber-aware_load_balancer",
              "product_id": "CSAFPID-93775",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_subscriber-aware_load_balancer",
            "product": {
              "name": "communications_subscriber-aware_load_balancer",
              "product_id": "CSAFPID-93774",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_subscriber-aware_load_balancer:9.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-240600",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673382",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78764",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78763",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.10:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673070",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.22:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673381",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1650731",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673530",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-764901",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78762",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-78761",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-614089",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_assurance",
            "product": {
              "name": "communications_unified_assurance",
              "product_id": "CSAFPID-1673068",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-764739",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204614",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.3.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-8984",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204510",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-204569",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-219826",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_inventory_management",
            "product": {
              "name": "communications_unified_inventory_management",
              "product_id": "CSAFPID-912073",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_session_manager",
            "product": {
              "name": "communications_unified_session_manager",
              "product_id": "CSAFPID-110243",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.2.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_unified_session_manager",
            "product": {
              "name": "communications_unified_session_manager",
              "product_id": "CSAFPID-205759",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_unified_session_manager:8.4.5:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503596",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503597",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1503598",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-764900",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-76994",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.4:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-568240",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-764782",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-355340",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.6.1:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-912080",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_user_data_repository",
            "product": {
              "name": "communications_user_data_repository",
              "product_id": "CSAFPID-1673481",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-912554",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-611408",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-703515",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-611407",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1.0.0:*:*:*:*:*:*:*"
              }
            }
          },
          {
            "category": "product_name",
            "name": "communications_webrtc_session_controller",
            "product": {
              "name": "communications_webrtc_session_controller",
              "product_id": "CSAFPID-204456",
              "product_identification_helper": {
                "cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:7.2.1:*:*:*:*:*:*:*"
              }
            }
          }
        ],
        "category": "vendor",
        "name": "oracle"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2021-37137",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-41182",
          "CSAFPID-209546",
          "CSAFPID-40608",
          "CSAFPID-180216",
          "CSAFPID-93547",
          "CSAFPID-180217",
          "CSAFPID-2310",
          "CSAFPID-40612",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45182",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-216017",
          "CSAFPID-764240",
          "CSAFPID-90021",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-94291",
          "CSAFPID-493443",
          "CSAFPID-224796",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-40293",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-93781",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-342793",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-342803",
          "CSAFPID-204563",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-1899",
          "CSAFPID-41111",
          "CSAFPID-40299",
          "CSAFPID-187447",
          "CSAFPID-1900",
          "CSAFPID-40301",
          "CSAFPID-180194",
          "CSAFPID-40298",
          "CSAFPID-41112",
          "CSAFPID-41110",
          "CSAFPID-41113",
          "CSAFPID-180193",
          "CSAFPID-1898",
          "CSAFPID-40300",
          "CSAFPID-611587",
          "CSAFPID-40297",
          "CSAFPID-110244",
          "CSAFPID-110242",
          "CSAFPID-9489",
          "CSAFPID-110249",
          "CSAFPID-40294",
          "CSAFPID-110243",
          "CSAFPID-204629",
          "CSAFPID-765241",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-41183",
          "CSAFPID-207586",
          "CSAFPID-765242",
          "CSAFPID-205759",
          "CSAFPID-1893",
          "CSAFPID-765365",
          "CSAFPID-765366",
          "CSAFPID-342804",
          "CSAFPID-342805",
          "CSAFPID-204456",
          "CSAFPID-1882",
          "CSAFPID-573035",
          "CSAFPID-204645",
          "CSAFPID-765367",
          "CSAFPID-765368",
          "CSAFPID-764242",
          "CSAFPID-76994",
          "CSAFPID-204623",
          "CSAFPID-352633",
          "CSAFPID-352632",
          "CSAFPID-765369",
          "CSAFPID-204528",
          "CSAFPID-342802",
          "CSAFPID-40610",
          "CSAFPID-40611",
          "CSAFPID-40609",
          "CSAFPID-180198",
          "CSAFPID-180196",
          "CSAFPID-180201",
          "CSAFPID-180202",
          "CSAFPID-40613",
          "CSAFPID-180199",
          "CSAFPID-93546",
          "CSAFPID-180195",
          "CSAFPID-180200",
          "CSAFPID-765371",
          "CSAFPID-89545",
          "CSAFPID-180215",
          "CSAFPID-180197",
          "CSAFPID-204639",
          "CSAFPID-204627",
          "CSAFPID-226017",
          "CSAFPID-219898",
          "CSAFPID-179774",
          "CSAFPID-342799",
          "CSAFPID-765372",
          "CSAFPID-220125",
          "CSAFPID-245244",
          "CSAFPID-204554",
          "CSAFPID-764739",
          "CSAFPID-204614",
          "CSAFPID-345031",
          "CSAFPID-204635",
          "CSAFPID-204595",
          "CSAFPID-204590",
          "CSAFPID-224787",
          "CSAFPID-1673381",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2021-37137",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-37137.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-41182",
            "CSAFPID-209546",
            "CSAFPID-40608",
            "CSAFPID-180216",
            "CSAFPID-93547",
            "CSAFPID-180217",
            "CSAFPID-2310",
            "CSAFPID-40612",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45182",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-216017",
            "CSAFPID-764240",
            "CSAFPID-90021",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-94291",
            "CSAFPID-493443",
            "CSAFPID-224796",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-40293",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-93781",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-342793",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-342803",
            "CSAFPID-204563",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-1899",
            "CSAFPID-41111",
            "CSAFPID-40299",
            "CSAFPID-187447",
            "CSAFPID-1900",
            "CSAFPID-40301",
            "CSAFPID-180194",
            "CSAFPID-40298",
            "CSAFPID-41112",
            "CSAFPID-41110",
            "CSAFPID-41113",
            "CSAFPID-180193",
            "CSAFPID-1898",
            "CSAFPID-40300",
            "CSAFPID-611587",
            "CSAFPID-40297",
            "CSAFPID-110244",
            "CSAFPID-110242",
            "CSAFPID-9489",
            "CSAFPID-110249",
            "CSAFPID-40294",
            "CSAFPID-110243",
            "CSAFPID-204629",
            "CSAFPID-765241",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-41183",
            "CSAFPID-207586",
            "CSAFPID-765242",
            "CSAFPID-205759",
            "CSAFPID-1893",
            "CSAFPID-765365",
            "CSAFPID-765366",
            "CSAFPID-342804",
            "CSAFPID-342805",
            "CSAFPID-204456",
            "CSAFPID-1882",
            "CSAFPID-573035",
            "CSAFPID-204645",
            "CSAFPID-765367",
            "CSAFPID-765368",
            "CSAFPID-764242",
            "CSAFPID-76994",
            "CSAFPID-204623",
            "CSAFPID-352633",
            "CSAFPID-352632",
            "CSAFPID-765369",
            "CSAFPID-204528",
            "CSAFPID-342802",
            "CSAFPID-40610",
            "CSAFPID-40611",
            "CSAFPID-40609",
            "CSAFPID-180198",
            "CSAFPID-180196",
            "CSAFPID-180201",
            "CSAFPID-180202",
            "CSAFPID-40613",
            "CSAFPID-180199",
            "CSAFPID-93546",
            "CSAFPID-180195",
            "CSAFPID-180200",
            "CSAFPID-765371",
            "CSAFPID-89545",
            "CSAFPID-180215",
            "CSAFPID-180197",
            "CSAFPID-204639",
            "CSAFPID-204627",
            "CSAFPID-226017",
            "CSAFPID-219898",
            "CSAFPID-179774",
            "CSAFPID-342799",
            "CSAFPID-765372",
            "CSAFPID-220125",
            "CSAFPID-245244",
            "CSAFPID-204554",
            "CSAFPID-764739",
            "CSAFPID-204614",
            "CSAFPID-345031",
            "CSAFPID-204635",
            "CSAFPID-204595",
            "CSAFPID-204590",
            "CSAFPID-224787",
            "CSAFPID-1673381",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2021-37137"
    },
    {
      "cve": "CVE-2022-2068",
      "cwe": {
        "id": "CWE-78",
        "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
          "title": "CWE-77"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-40949",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45182",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-216017",
          "CSAFPID-764240",
          "CSAFPID-90021",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-94291",
          "CSAFPID-493443",
          "CSAFPID-224796",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-40293",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-93781",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-342793",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-342803",
          "CSAFPID-204563",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-40294",
          "CSAFPID-93631",
          "CSAFPID-764900",
          "CSAFPID-568240",
          "CSAFPID-355340",
          "CSAFPID-703515",
          "CSAFPID-204456",
          "CSAFPID-764735",
          "CSAFPID-204635",
          "CSAFPID-41183",
          "CSAFPID-234306",
          "CSAFPID-41182",
          "CSAFPID-226017",
          "CSAFPID-219898",
          "CSAFPID-179774",
          "CSAFPID-764738",
          "CSAFPID-764901",
          "CSAFPID-764902",
          "CSAFPID-220547",
          "CSAFPID-187447",
          "CSAFPID-760687",
          "CSAFPID-40947",
          "CSAFPID-2044",
          "CSAFPID-449747",
          "CSAFPID-40301",
          "CSAFPID-449746",
          "CSAFPID-40298",
          "CSAFPID-223527",
          "CSAFPID-760688",
          "CSAFPID-93636",
          "CSAFPID-40300",
          "CSAFPID-93653",
          "CSAFPID-642000",
          "CSAFPID-642002",
          "CSAFPID-642001",
          "CSAFPID-165576",
          "CSAFPID-764899",
          "CSAFPID-40948",
          "CSAFPID-426842",
          "CSAFPID-93630",
          "CSAFPID-204645",
          "CSAFPID-1893",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2068",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2068.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-40949",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45182",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-216017",
            "CSAFPID-764240",
            "CSAFPID-90021",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-94291",
            "CSAFPID-493443",
            "CSAFPID-224796",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-40293",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-93781",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-342793",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-342803",
            "CSAFPID-204563",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-40294",
            "CSAFPID-93631",
            "CSAFPID-764900",
            "CSAFPID-568240",
            "CSAFPID-355340",
            "CSAFPID-703515",
            "CSAFPID-204456",
            "CSAFPID-764735",
            "CSAFPID-204635",
            "CSAFPID-41183",
            "CSAFPID-234306",
            "CSAFPID-41182",
            "CSAFPID-226017",
            "CSAFPID-219898",
            "CSAFPID-179774",
            "CSAFPID-764738",
            "CSAFPID-764901",
            "CSAFPID-764902",
            "CSAFPID-220547",
            "CSAFPID-187447",
            "CSAFPID-760687",
            "CSAFPID-40947",
            "CSAFPID-2044",
            "CSAFPID-449747",
            "CSAFPID-40301",
            "CSAFPID-449746",
            "CSAFPID-40298",
            "CSAFPID-223527",
            "CSAFPID-760688",
            "CSAFPID-93636",
            "CSAFPID-40300",
            "CSAFPID-93653",
            "CSAFPID-642000",
            "CSAFPID-642002",
            "CSAFPID-642001",
            "CSAFPID-165576",
            "CSAFPID-764899",
            "CSAFPID-40948",
            "CSAFPID-426842",
            "CSAFPID-93630",
            "CSAFPID-204645",
            "CSAFPID-1893",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-2068"
    },
    {
      "cve": "CVE-2022-2601",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-2601",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-2601.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-2601"
    },
    {
      "cve": "CVE-2022-23437",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-204629",
          "CSAFPID-704410",
          "CSAFPID-704411",
          "CSAFPID-704412",
          "CSAFPID-226017",
          "CSAFPID-179774",
          "CSAFPID-219898",
          "CSAFPID-219826",
          "CSAFPID-204569",
          "CSAFPID-204510",
          "CSAFPID-220057",
          "CSAFPID-220055",
          "CSAFPID-220909",
          "CSAFPID-45184",
          "CSAFPID-45182",
          "CSAFPID-220559",
          "CSAFPID-220558",
          "CSAFPID-220327",
          "CSAFPID-220325",
          "CSAFPID-219838",
          "CSAFPID-220056",
          "CSAFPID-223511",
          "CSAFPID-216017",
          "CSAFPID-220889",
          "CSAFPID-220918",
          "CSAFPID-90020",
          "CSAFPID-90015",
          "CSAFPID-220133",
          "CSAFPID-220561",
          "CSAFPID-90021",
          "CSAFPID-220881",
          "CSAFPID-94291",
          "CSAFPID-220910",
          "CSAFPID-220324",
          "CSAFPID-224796",
          "CSAFPID-224795",
          "CSAFPID-220326",
          "CSAFPID-764734",
          "CSAFPID-40293",
          "CSAFPID-220167",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764736",
          "CSAFPID-764737",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-219803",
          "CSAFPID-375182",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-219776",
          "CSAFPID-224791",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-764738",
          "CSAFPID-240600",
          "CSAFPID-764739",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-764240",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-493443",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-204563",
          "CSAFPID-8984",
          "CSAFPID-220548",
          "CSAFPID-608629",
          "CSAFPID-93784",
          "CSAFPID-41111",
          "CSAFPID-1685",
          "CSAFPID-493445",
          "CSAFPID-294401",
          "CSAFPID-220547",
          "CSAFPID-764824",
          "CSAFPID-220459",
          "CSAFPID-764825",
          "CSAFPID-93635",
          "CSAFPID-503534",
          "CSAFPID-503493",
          "CSAFPID-493444",
          "CSAFPID-93633",
          "CSAFPID-260395",
          "CSAFPID-260393",
          "CSAFPID-220468",
          "CSAFPID-93636",
          "CSAFPID-93634",
          "CSAFPID-589926",
          "CSAFPID-179780",
          "CSAFPID-589925",
          "CSAFPID-179779",
          "CSAFPID-764826",
          "CSAFPID-764827",
          "CSAFPID-764828",
          "CSAFPID-764829",
          "CSAFPID-764830",
          "CSAFPID-220190",
          "CSAFPID-220189",
          "CSAFPID-764833",
          "CSAFPID-41183",
          "CSAFPID-764834",
          "CSAFPID-234306",
          "CSAFPID-764835",
          "CSAFPID-187447",
          "CSAFPID-760687",
          "CSAFPID-40947",
          "CSAFPID-2044",
          "CSAFPID-449747",
          "CSAFPID-40301",
          "CSAFPID-449746",
          "CSAFPID-40298",
          "CSAFPID-223527",
          "CSAFPID-760688",
          "CSAFPID-40300",
          "CSAFPID-93653",
          "CSAFPID-40949",
          "CSAFPID-642000",
          "CSAFPID-642002",
          "CSAFPID-642001",
          "CSAFPID-165576",
          "CSAFPID-764899",
          "CSAFPID-40948",
          "CSAFPID-426842",
          "CSAFPID-93630",
          "CSAFPID-204645",
          "CSAFPID-1893",
          "CSAFPID-40294",
          "CSAFPID-93631",
          "CSAFPID-764900",
          "CSAFPID-568240",
          "CSAFPID-355340",
          "CSAFPID-703515",
          "CSAFPID-204456",
          "CSAFPID-204635",
          "CSAFPID-41182",
          "CSAFPID-764901",
          "CSAFPID-764902",
          "CSAFPID-1899",
          "CSAFPID-40299",
          "CSAFPID-1900",
          "CSAFPID-180194",
          "CSAFPID-41112",
          "CSAFPID-41110",
          "CSAFPID-41113",
          "CSAFPID-180193",
          "CSAFPID-1898",
          "CSAFPID-611587",
          "CSAFPID-40297",
          "CSAFPID-110244",
          "CSAFPID-110242",
          "CSAFPID-9489",
          "CSAFPID-110249",
          "CSAFPID-110243",
          "CSAFPID-765241",
          "CSAFPID-209546",
          "CSAFPID-207586",
          "CSAFPID-765242",
          "CSAFPID-205759",
          "CSAFPID-765365",
          "CSAFPID-765366",
          "CSAFPID-342804",
          "CSAFPID-342805",
          "CSAFPID-1882",
          "CSAFPID-573035",
          "CSAFPID-765367",
          "CSAFPID-765368",
          "CSAFPID-764242",
          "CSAFPID-76994",
          "CSAFPID-204623",
          "CSAFPID-352633",
          "CSAFPID-352632",
          "CSAFPID-765369",
          "CSAFPID-204528",
          "CSAFPID-342802",
          "CSAFPID-40610",
          "CSAFPID-40611",
          "CSAFPID-40609",
          "CSAFPID-180198",
          "CSAFPID-180217",
          "CSAFPID-180196",
          "CSAFPID-40612",
          "CSAFPID-180201",
          "CSAFPID-180216",
          "CSAFPID-180202",
          "CSAFPID-40613",
          "CSAFPID-40608",
          "CSAFPID-180199",
          "CSAFPID-93546",
          "CSAFPID-180195",
          "CSAFPID-2310",
          "CSAFPID-93547",
          "CSAFPID-180200",
          "CSAFPID-765371",
          "CSAFPID-89545",
          "CSAFPID-180215",
          "CSAFPID-180197",
          "CSAFPID-204639",
          "CSAFPID-204627",
          "CSAFPID-342799",
          "CSAFPID-765372",
          "CSAFPID-220125",
          "CSAFPID-245244",
          "CSAFPID-204554",
          "CSAFPID-204614",
          "CSAFPID-345031",
          "CSAFPID-204595",
          "CSAFPID-204590",
          "CSAFPID-224787",
          "CSAFPID-1673065",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-23437",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-23437.json"
        }
      ],
      "title": "CVE-2022-23437"
    },
    {
      "cve": "CVE-2022-36760",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
          "title": "CWE-444"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220057",
          "CSAFPID-220055",
          "CSAFPID-220909",
          "CSAFPID-45184",
          "CSAFPID-45182",
          "CSAFPID-220559",
          "CSAFPID-220558",
          "CSAFPID-220327",
          "CSAFPID-220325",
          "CSAFPID-219838",
          "CSAFPID-220056",
          "CSAFPID-223511",
          "CSAFPID-216017",
          "CSAFPID-220889",
          "CSAFPID-220918",
          "CSAFPID-90020",
          "CSAFPID-90015",
          "CSAFPID-220133",
          "CSAFPID-220561",
          "CSAFPID-90021",
          "CSAFPID-220881",
          "CSAFPID-94291",
          "CSAFPID-220910",
          "CSAFPID-220324",
          "CSAFPID-224796",
          "CSAFPID-224795",
          "CSAFPID-220326",
          "CSAFPID-764734",
          "CSAFPID-40293",
          "CSAFPID-220167",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764736",
          "CSAFPID-764737",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-704412",
          "CSAFPID-704411",
          "CSAFPID-704410",
          "CSAFPID-219803",
          "CSAFPID-375182",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-219776",
          "CSAFPID-224791",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-764738",
          "CSAFPID-240600",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-391501",
          "CSAFPID-440102",
          "CSAFPID-41516",
          "CSAFPID-41515",
          "CSAFPID-764237",
          "CSAFPID-45181",
          "CSAFPID-45186",
          "CSAFPID-45185",
          "CSAFPID-90018",
          "CSAFPID-94290",
          "CSAFPID-260394",
          "CSAFPID-764240",
          "CSAFPID-94292",
          "CSAFPID-218028",
          "CSAFPID-493443",
          "CSAFPID-90019",
          "CSAFPID-90016",
          "CSAFPID-93777",
          "CSAFPID-93772",
          "CSAFPID-345038",
          "CSAFPID-93629",
          "CSAFPID-45192",
          "CSAFPID-608630",
          "CSAFPID-40292",
          "CSAFPID-40291",
          "CSAFPID-345039",
          "CSAFPID-93628",
          "CSAFPID-764780",
          "CSAFPID-764781",
          "CSAFPID-93775",
          "CSAFPID-93774",
          "CSAFPID-764782",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-204563",
          "CSAFPID-8984",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2022-36760",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-36760.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220057",
            "CSAFPID-220055",
            "CSAFPID-220909",
            "CSAFPID-45184",
            "CSAFPID-45182",
            "CSAFPID-220559",
            "CSAFPID-220558",
            "CSAFPID-220327",
            "CSAFPID-220325",
            "CSAFPID-219838",
            "CSAFPID-220056",
            "CSAFPID-223511",
            "CSAFPID-216017",
            "CSAFPID-220889",
            "CSAFPID-220918",
            "CSAFPID-90020",
            "CSAFPID-90015",
            "CSAFPID-220133",
            "CSAFPID-220561",
            "CSAFPID-90021",
            "CSAFPID-220881",
            "CSAFPID-94291",
            "CSAFPID-220910",
            "CSAFPID-220324",
            "CSAFPID-224796",
            "CSAFPID-224795",
            "CSAFPID-220326",
            "CSAFPID-764734",
            "CSAFPID-40293",
            "CSAFPID-220167",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764736",
            "CSAFPID-764737",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-704412",
            "CSAFPID-704411",
            "CSAFPID-704410",
            "CSAFPID-219803",
            "CSAFPID-375182",
            "CSAFPID-342803",
            "CSAFPID-1266",
            "CSAFPID-219776",
            "CSAFPID-224791",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-764738",
            "CSAFPID-240600",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-391501",
            "CSAFPID-440102",
            "CSAFPID-41516",
            "CSAFPID-41515",
            "CSAFPID-764237",
            "CSAFPID-45181",
            "CSAFPID-45186",
            "CSAFPID-45185",
            "CSAFPID-90018",
            "CSAFPID-94290",
            "CSAFPID-260394",
            "CSAFPID-764240",
            "CSAFPID-94292",
            "CSAFPID-218028",
            "CSAFPID-493443",
            "CSAFPID-90019",
            "CSAFPID-90016",
            "CSAFPID-93777",
            "CSAFPID-93772",
            "CSAFPID-345038",
            "CSAFPID-93629",
            "CSAFPID-45192",
            "CSAFPID-608630",
            "CSAFPID-40292",
            "CSAFPID-40291",
            "CSAFPID-345039",
            "CSAFPID-93628",
            "CSAFPID-764780",
            "CSAFPID-764781",
            "CSAFPID-93775",
            "CSAFPID-93774",
            "CSAFPID-764782",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-204563",
            "CSAFPID-8984",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2022-36760"
    },
    {
      "cve": "CVE-2023-2953",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "NULL Pointer Dereference",
          "title": "CWE-476"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673391",
          "CSAFPID-1673392",
          "CSAFPID-1673393",
          "CSAFPID-1673394",
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-2953",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2953.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673391",
            "CSAFPID-1673392",
            "CSAFPID-1673393",
            "CSAFPID-1673394",
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-2953"
    },
    {
      "cve": "CVE-2023-3635",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "other",
          "text": "Signed to Unsigned Conversion Error",
          "title": "CWE-195"
        },
        {
          "category": "other",
          "text": "Uncaught Exception",
          "title": "CWE-248"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-94291",
          "CSAFPID-40293",
          "CSAFPID-204622",
          "CSAFPID-1265",
          "CSAFPID-1261",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-1673399",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-219909",
          "CSAFPID-220558",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-240600",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611401",
          "CSAFPID-611406",
          "CSAFPID-611407",
          "CSAFPID-611408",
          "CSAFPID-611413",
          "CSAFPID-611595",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-219803",
          "CSAFPID-219838",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-342803",
          "CSAFPID-614513",
          "CSAFPID-614514",
          "CSAFPID-614515",
          "CSAFPID-614516",
          "CSAFPID-614517",
          "CSAFPID-618156",
          "CSAFPID-643776",
          "CSAFPID-764237",
          "CSAFPID-764238",
          "CSAFPID-764239",
          "CSAFPID-764240",
          "CSAFPID-764241",
          "CSAFPID-764242",
          "CSAFPID-764243",
          "CSAFPID-764247",
          "CSAFPID-764248",
          "CSAFPID-764249",
          "CSAFPID-816346",
          "CSAFPID-816347",
          "CSAFPID-816348",
          "CSAFPID-816349",
          "CSAFPID-816350",
          "CSAFPID-816351",
          "CSAFPID-816352",
          "CSAFPID-816353",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816776",
          "CSAFPID-816777",
          "CSAFPID-816778",
          "CSAFPID-816779",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-764735",
          "CSAFPID-764738",
          "CSAFPID-912073",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-912102",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-3635",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-3635.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-94291",
            "CSAFPID-40293",
            "CSAFPID-204622",
            "CSAFPID-1265",
            "CSAFPID-1261",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-1673399",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-219909",
            "CSAFPID-220558",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-240600",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611401",
            "CSAFPID-611406",
            "CSAFPID-611407",
            "CSAFPID-611408",
            "CSAFPID-611413",
            "CSAFPID-611595",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-219803",
            "CSAFPID-219838",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-342803",
            "CSAFPID-614513",
            "CSAFPID-614514",
            "CSAFPID-614515",
            "CSAFPID-614516",
            "CSAFPID-614517",
            "CSAFPID-618156",
            "CSAFPID-643776",
            "CSAFPID-764237",
            "CSAFPID-764238",
            "CSAFPID-764239",
            "CSAFPID-764240",
            "CSAFPID-764241",
            "CSAFPID-764242",
            "CSAFPID-764243",
            "CSAFPID-764247",
            "CSAFPID-764248",
            "CSAFPID-764249",
            "CSAFPID-816346",
            "CSAFPID-816347",
            "CSAFPID-816348",
            "CSAFPID-816349",
            "CSAFPID-816350",
            "CSAFPID-816351",
            "CSAFPID-816352",
            "CSAFPID-816353",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816776",
            "CSAFPID-816777",
            "CSAFPID-816778",
            "CSAFPID-816779",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-764735",
            "CSAFPID-764738",
            "CSAFPID-912073",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-912102",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242"
          ]
        }
      ],
      "title": "CVE-2023-3635"
    },
    {
      "cve": "CVE-2023-4043",
      "cwe": {
        "id": "CWE-834",
        "name": "Excessive Iteration"
      },
      "notes": [
        {
          "category": "other",
          "text": "Excessive Iteration",
          "title": "CWE-834"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-219838",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816346",
          "CSAFPID-816776",
          "CSAFPID-816348",
          "CSAFPID-816777",
          "CSAFPID-816347",
          "CSAFPID-94291",
          "CSAFPID-816778",
          "CSAFPID-614517",
          "CSAFPID-816779",
          "CSAFPID-816349",
          "CSAFPID-40293",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816353",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816352",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-342804",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-224793",
          "CSAFPID-816794",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-219803",
          "CSAFPID-219909",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-240600",
          "CSAFPID-342803",
          "CSAFPID-611595",
          "CSAFPID-764738",
          "CSAFPID-816351",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-219826",
          "CSAFPID-764739",
          "CSAFPID-912073",
          "CSAFPID-912558"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-4043",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4043.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-219838",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816346",
            "CSAFPID-816776",
            "CSAFPID-816348",
            "CSAFPID-816777",
            "CSAFPID-816347",
            "CSAFPID-94291",
            "CSAFPID-816778",
            "CSAFPID-614517",
            "CSAFPID-816779",
            "CSAFPID-816349",
            "CSAFPID-40293",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816353",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816352",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-342804",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-224793",
            "CSAFPID-816794",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-219803",
            "CSAFPID-219909",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-240600",
            "CSAFPID-342803",
            "CSAFPID-611595",
            "CSAFPID-764738",
            "CSAFPID-816351",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-219826",
            "CSAFPID-764739",
            "CSAFPID-912073",
            "CSAFPID-912558"
          ]
        }
      ],
      "title": "CVE-2023-4043"
    },
    {
      "cve": "CVE-2023-5685",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-5685",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5685.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2023-5685"
    },
    {
      "cve": "CVE-2023-6597",
      "cwe": {
        "id": "CWE-61",
        "name": "UNIX Symbolic Link (Symlink) Following"
      },
      "notes": [
        {
          "category": "other",
          "text": "UNIX Symbolic Link (Symlink) Following",
          "title": "CWE-61"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6597",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2023-6597"
    },
    {
      "cve": "CVE-2023-6816",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
          "title": "CWE-119"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-6816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6816.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-6816"
    },
    {
      "cve": "CVE-2023-38408",
      "cwe": {
        "id": "CWE-94",
        "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
          "title": "CWE-94"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-45182",
          "CSAFPID-40293",
          "CSAFPID-611406",
          "CSAFPID-764237",
          "CSAFPID-220558",
          "CSAFPID-764238",
          "CSAFPID-764239",
          "CSAFPID-614513",
          "CSAFPID-643776",
          "CSAFPID-611387",
          "CSAFPID-618156",
          "CSAFPID-614516",
          "CSAFPID-614515",
          "CSAFPID-614514",
          "CSAFPID-764240",
          "CSAFPID-94291",
          "CSAFPID-611401",
          "CSAFPID-614517",
          "CSAFPID-764241",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-764243",
          "CSAFPID-342804",
          "CSAFPID-611408",
          "CSAFPID-611407",
          "CSAFPID-764247",
          "CSAFPID-764248",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-611595",
          "CSAFPID-764249",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-240600",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-38408",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-38408.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-45182",
            "CSAFPID-40293",
            "CSAFPID-611406",
            "CSAFPID-764237",
            "CSAFPID-220558",
            "CSAFPID-764238",
            "CSAFPID-764239",
            "CSAFPID-614513",
            "CSAFPID-643776",
            "CSAFPID-611387",
            "CSAFPID-618156",
            "CSAFPID-614516",
            "CSAFPID-614515",
            "CSAFPID-614514",
            "CSAFPID-764240",
            "CSAFPID-94291",
            "CSAFPID-611401",
            "CSAFPID-614517",
            "CSAFPID-764241",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-764243",
            "CSAFPID-342804",
            "CSAFPID-611408",
            "CSAFPID-611407",
            "CSAFPID-764247",
            "CSAFPID-764248",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-611595",
            "CSAFPID-764249",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-240600",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-38408"
    },
    {
      "cve": "CVE-2023-43642",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-40293",
          "CSAFPID-1265",
          "CSAFPID-1261",
          "CSAFPID-1266",
          "CSAFPID-8984",
          "CSAFPID-1673395",
          "CSAFPID-94291",
          "CSAFPID-204510",
          "CSAFPID-204563",
          "CSAFPID-204569",
          "CSAFPID-204622",
          "CSAFPID-219803",
          "CSAFPID-219838",
          "CSAFPID-219909",
          "CSAFPID-221118",
          "CSAFPID-224790",
          "CSAFPID-224793",
          "CSAFPID-240600",
          "CSAFPID-342793",
          "CSAFPID-342803",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-611595",
          "CSAFPID-614517",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764738",
          "CSAFPID-816346",
          "CSAFPID-816347",
          "CSAFPID-816348",
          "CSAFPID-816349",
          "CSAFPID-816350",
          "CSAFPID-816351",
          "CSAFPID-816352",
          "CSAFPID-816353",
          "CSAFPID-816354",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816776",
          "CSAFPID-816777",
          "CSAFPID-816778",
          "CSAFPID-816779",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816786",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-43642",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43642.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-40293",
            "CSAFPID-1265",
            "CSAFPID-1261",
            "CSAFPID-1266",
            "CSAFPID-8984",
            "CSAFPID-1673395",
            "CSAFPID-94291",
            "CSAFPID-204510",
            "CSAFPID-204563",
            "CSAFPID-204569",
            "CSAFPID-204622",
            "CSAFPID-219803",
            "CSAFPID-219838",
            "CSAFPID-219909",
            "CSAFPID-221118",
            "CSAFPID-224790",
            "CSAFPID-224793",
            "CSAFPID-240600",
            "CSAFPID-342793",
            "CSAFPID-342803",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-611595",
            "CSAFPID-614517",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764738",
            "CSAFPID-816346",
            "CSAFPID-816347",
            "CSAFPID-816348",
            "CSAFPID-816349",
            "CSAFPID-816350",
            "CSAFPID-816351",
            "CSAFPID-816352",
            "CSAFPID-816353",
            "CSAFPID-816354",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816776",
            "CSAFPID-816777",
            "CSAFPID-816778",
            "CSAFPID-816779",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816786",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797"
          ]
        }
      ],
      "title": "CVE-2023-43642"
    },
    {
      "cve": "CVE-2023-46136",
      "cwe": {
        "id": "CWE-407",
        "name": "Inefficient Algorithmic Complexity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Inefficient Algorithmic Complexity",
          "title": "CWE-407"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673411",
          "CSAFPID-912549",
          "CSAFPID-1673412",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-220132",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673416",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-46136",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46136.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.0,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673411",
            "CSAFPID-912549",
            "CSAFPID-1673412",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-220132",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673416",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2023-46136"
    },
    {
      "cve": "CVE-2023-48795",
      "cwe": {
        "id": "CWE-222",
        "name": "Truncation of Security-relevant Information"
      },
      "notes": [
        {
          "category": "other",
          "text": "Truncation of Security-relevant Information",
          "title": "CWE-222"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-816765",
          "CSAFPID-816766",
          "CSAFPID-816767",
          "CSAFPID-816768",
          "CSAFPID-816769",
          "CSAFPID-816770",
          "CSAFPID-816771",
          "CSAFPID-816772",
          "CSAFPID-219838",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-816774",
          "CSAFPID-816775",
          "CSAFPID-816346",
          "CSAFPID-816776",
          "CSAFPID-816348",
          "CSAFPID-816777",
          "CSAFPID-816347",
          "CSAFPID-94291",
          "CSAFPID-816778",
          "CSAFPID-614517",
          "CSAFPID-816779",
          "CSAFPID-816349",
          "CSAFPID-40293",
          "CSAFPID-764242",
          "CSAFPID-816780",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-816783",
          "CSAFPID-816784",
          "CSAFPID-816785",
          "CSAFPID-816353",
          "CSAFPID-816786",
          "CSAFPID-816352",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-224793",
          "CSAFPID-342793",
          "CSAFPID-1265",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-219803",
          "CSAFPID-816351",
          "CSAFPID-611595",
          "CSAFPID-342803",
          "CSAFPID-1266",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673417",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-90016",
          "CSAFPID-764826",
          "CSAFPID-345038",
          "CSAFPID-912079",
          "CSAFPID-220132",
          "CSAFPID-93781",
          "CSAFPID-345039",
          "CSAFPID-912080",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-611413",
          "CSAFPID-240600",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-816357",
          "CSAFPID-816358",
          "CSAFPID-816359",
          "CSAFPID-816787",
          "CSAFPID-816788",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-816791",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-816794",
          "CSAFPID-816795",
          "CSAFPID-816796",
          "CSAFPID-816797",
          "CSAFPID-8984",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-1503601",
          "CSAFPID-1503602"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-48795",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-48795.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-816765",
            "CSAFPID-816766",
            "CSAFPID-816767",
            "CSAFPID-816768",
            "CSAFPID-816769",
            "CSAFPID-816770",
            "CSAFPID-816771",
            "CSAFPID-816772",
            "CSAFPID-219838",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-816774",
            "CSAFPID-816775",
            "CSAFPID-816346",
            "CSAFPID-816776",
            "CSAFPID-816348",
            "CSAFPID-816777",
            "CSAFPID-816347",
            "CSAFPID-94291",
            "CSAFPID-816778",
            "CSAFPID-614517",
            "CSAFPID-816779",
            "CSAFPID-816349",
            "CSAFPID-40293",
            "CSAFPID-764242",
            "CSAFPID-816780",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-816783",
            "CSAFPID-816784",
            "CSAFPID-816785",
            "CSAFPID-816353",
            "CSAFPID-816786",
            "CSAFPID-816352",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-224793",
            "CSAFPID-342793",
            "CSAFPID-1265",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-219803",
            "CSAFPID-816351",
            "CSAFPID-611595",
            "CSAFPID-342803",
            "CSAFPID-1266",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673417",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-90016",
            "CSAFPID-764826",
            "CSAFPID-345038",
            "CSAFPID-912079",
            "CSAFPID-220132",
            "CSAFPID-93781",
            "CSAFPID-345039",
            "CSAFPID-912080",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-611413",
            "CSAFPID-240600",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-816357",
            "CSAFPID-816358",
            "CSAFPID-816359",
            "CSAFPID-816787",
            "CSAFPID-816788",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-816791",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-816794",
            "CSAFPID-816795",
            "CSAFPID-816796",
            "CSAFPID-816797",
            "CSAFPID-8984",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-1503601",
            "CSAFPID-1503602"
          ]
        }
      ],
      "title": "CVE-2023-48795"
    },
    {
      "cve": "CVE-2023-51775",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650751",
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-51775",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-51775.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650751",
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2023-51775"
    },
    {
      "cve": "CVE-2023-52428",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912073",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912102",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2023-52428",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-52428.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912073",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912102",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2023-52428"
    },
    {
      "cve": "CVE-2024-0450",
      "cwe": {
        "id": "CWE-450",
        "name": "Multiple Interpretations of UI Input"
      },
      "notes": [
        {
          "category": "other",
          "text": "Multiple Interpretations of UI Input",
          "title": "CWE-450"
        },
        {
          "category": "other",
          "text": "Asymmetric Resource Consumption (Amplification)",
          "title": "CWE-405"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-0450",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-0450"
    },
    {
      "cve": "CVE-2024-2398",
      "cwe": {
        "id": "CWE-772",
        "name": "Missing Release of Resource after Effective Lifetime"
      },
      "notes": [
        {
          "category": "other",
          "text": "Missing Release of Resource after Effective Lifetime",
          "title": "CWE-772"
        },
        {
          "category": "other",
          "text": "Missing Release of Memory after Effective Lifetime",
          "title": "CWE-401"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673399",
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-2398",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2398.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673399",
            "CSAFPID-1673391",
            "CSAFPID-1673394",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-2398"
    },
    {
      "cve": "CVE-2024-4577",
      "cwe": {
        "id": "CWE-88",
        "name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
          "title": "CWE-88"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650731",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4577",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4577.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650731",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-4577"
    },
    {
      "cve": "CVE-2024-4603",
      "cwe": {
        "id": "CWE-606",
        "name": "Unchecked Input for Loop Condition"
      },
      "notes": [
        {
          "category": "other",
          "text": "Unchecked Input for Loop Condition",
          "title": "CWE-606"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-4603",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4603.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673391",
            "CSAFPID-1673394",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-4603"
    },
    {
      "cve": "CVE-2024-5585",
      "cwe": {
        "id": "CWE-116",
        "name": "Improper Encoding or Escaping of Output"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Encoding or Escaping of Output",
          "title": "CWE-116"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
          "title": "CWE-78"
        },
        {
          "category": "other",
          "text": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)",
          "title": "CWE-88"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5585",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5585.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2024-5585"
    },
    {
      "cve": "CVE-2024-5971",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1673399",
          "CSAFPID-1673526",
          "CSAFPID-1673413",
          "CSAFPID-1673396",
          "CSAFPID-1673415",
          "CSAFPID-1673501",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-5971",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5971.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1673399",
            "CSAFPID-1673526",
            "CSAFPID-1673413",
            "CSAFPID-1673396",
            "CSAFPID-1673415",
            "CSAFPID-1673501",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-5971"
    },
    {
      "cve": "CVE-2024-6162",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673526",
          "CSAFPID-1673399",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6162",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673526",
            "CSAFPID-1673399",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-6162"
    },
    {
      "cve": "CVE-2024-6387",
      "cwe": {
        "id": "CWE-362",
        "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
          "title": "CWE-362"
        },
        {
          "category": "other",
          "text": "Signal Handler Race Condition",
          "title": "CWE-364"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1503595",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-6387",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6387.json"
        }
      ],
      "title": "CVE-2024-6387"
    },
    {
      "cve": "CVE-2024-7254",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Uncontrolled Recursion",
          "title": "CWE-674"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673391",
          "CSAFPID-1673394",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7254",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
        }
      ],
      "title": "CVE-2024-7254"
    },
    {
      "cve": "CVE-2024-7264",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673530",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-7264",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7264.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673530",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628"
          ]
        }
      ],
      "title": "CVE-2024-7264"
    },
    {
      "cve": "CVE-2024-22020",
      "product_status": {
        "known_affected": [
          "CSAFPID-912101",
          "CSAFPID-1673473",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22020",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22020.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912101",
            "CSAFPID-1673473",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-22020"
    },
    {
      "cve": "CVE-2024-22201",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673475",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-219776",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-224795",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22201",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22201.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673475",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-219776",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-224795",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-22201"
    },
    {
      "cve": "CVE-2024-22257",
      "cwe": {
        "id": "CWE-284",
        "name": "Improper Access Control"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Access Control",
          "title": "CWE-284"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-764237",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-342804",
          "CSAFPID-912080",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22257",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22257.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.2,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-764237",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-342804",
            "CSAFPID-912080",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-22257"
    },
    {
      "cve": "CVE-2024-22262",
      "cwe": {
        "id": "CWE-601",
        "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
          "title": "CWE-601"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650820",
          "CSAFPID-1650751",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-22262",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22262.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650820",
            "CSAFPID-1650751",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-22262"
    },
    {
      "cve": "CVE-2024-23672",
      "cwe": {
        "id": "CWE-459",
        "name": "Incomplete Cleanup"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incomplete Cleanup",
          "title": "CWE-459"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650826",
          "CSAFPID-1650731",
          "CSAFPID-1673382",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-614517",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23672",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23672.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650826",
            "CSAFPID-1650731",
            "CSAFPID-1673382",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-614517",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-23672"
    },
    {
      "cve": "CVE-2024-23807",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650734",
          "CSAFPID-1650830",
          "CSAFPID-1650777",
          "CSAFPID-204622",
          "CSAFPID-219909",
          "CSAFPID-1650778",
          "CSAFPID-41182",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-23807",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-23807.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650734",
            "CSAFPID-1650830",
            "CSAFPID-1650777",
            "CSAFPID-204622",
            "CSAFPID-219909",
            "CSAFPID-1650778",
            "CSAFPID-41182",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-23807"
    },
    {
      "cve": "CVE-2024-24549",
      "cwe": {
        "id": "CWE-20",
        "name": "Improper Input Validation"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650826",
          "CSAFPID-1673382",
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-816773",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-764240",
          "CSAFPID-614517",
          "CSAFPID-224795",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-93781",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-342804",
          "CSAFPID-912080",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-219776",
          "CSAFPID-765242",
          "CSAFPID-764739",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219826",
          "CSAFPID-912073",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-24549",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24549.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650826",
            "CSAFPID-1673382",
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-816773",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-764240",
            "CSAFPID-614517",
            "CSAFPID-224795",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-93781",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-342804",
            "CSAFPID-912080",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-219776",
            "CSAFPID-765242",
            "CSAFPID-764739",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219826",
            "CSAFPID-912073",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-24549"
    },
    {
      "cve": "CVE-2024-25062",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "other",
          "text": "Use After Free",
          "title": "CWE-416"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650751",
          "CSAFPID-1650752",
          "CSAFPID-1673481",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-912068",
          "CSAFPID-912076",
          "CSAFPID-611387",
          "CSAFPID-912539",
          "CSAFPID-816773",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912101",
          "CSAFPID-912544",
          "CSAFPID-912077",
          "CSAFPID-816348",
          "CSAFPID-912545",
          "CSAFPID-764240",
          "CSAFPID-912546",
          "CSAFPID-614517",
          "CSAFPID-912547",
          "CSAFPID-224795",
          "CSAFPID-912548",
          "CSAFPID-912102",
          "CSAFPID-912549",
          "CSAFPID-764826",
          "CSAFPID-90016",
          "CSAFPID-912078",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-611413",
          "CSAFPID-764242",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912553",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-342804",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-765242",
          "CSAFPID-912073",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25062",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25062.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650751",
            "CSAFPID-1650752",
            "CSAFPID-1673481",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-912068",
            "CSAFPID-912076",
            "CSAFPID-611387",
            "CSAFPID-912539",
            "CSAFPID-816773",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912101",
            "CSAFPID-912544",
            "CSAFPID-912077",
            "CSAFPID-816348",
            "CSAFPID-912545",
            "CSAFPID-764240",
            "CSAFPID-912546",
            "CSAFPID-614517",
            "CSAFPID-912547",
            "CSAFPID-224795",
            "CSAFPID-912548",
            "CSAFPID-912102",
            "CSAFPID-912549",
            "CSAFPID-764826",
            "CSAFPID-90016",
            "CSAFPID-912078",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-611413",
            "CSAFPID-764242",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912553",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-342804",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-765242",
            "CSAFPID-912073",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-25062"
    },
    {
      "cve": "CVE-2024-25638",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        },
        {
          "category": "other",
          "text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
          "title": "CWE-349"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-25638",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.9,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-25638"
    },
    {
      "cve": "CVE-2024-26308",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-1670429",
          "CSAFPID-1670430",
          "CSAFPID-1670431",
          "CSAFPID-1670432",
          "CSAFPID-1670433",
          "CSAFPID-1670434",
          "CSAFPID-1670435",
          "CSAFPID-1670436",
          "CSAFPID-1670437",
          "CSAFPID-1670438",
          "CSAFPID-1670439",
          "CSAFPID-1670440",
          "CSAFPID-1670441",
          "CSAFPID-1670442",
          "CSAFPID-90016",
          "CSAFPID-93781",
          "CSAFPID-204510",
          "CSAFPID-204569",
          "CSAFPID-219776",
          "CSAFPID-219826",
          "CSAFPID-220132",
          "CSAFPID-224795",
          "CSAFPID-342804",
          "CSAFPID-611387",
          "CSAFPID-611413",
          "CSAFPID-614517",
          "CSAFPID-764237",
          "CSAFPID-764240",
          "CSAFPID-764242",
          "CSAFPID-764247",
          "CSAFPID-764735",
          "CSAFPID-764739",
          "CSAFPID-764826",
          "CSAFPID-765242",
          "CSAFPID-816348",
          "CSAFPID-816773",
          "CSAFPID-816781",
          "CSAFPID-816782",
          "CSAFPID-912068",
          "CSAFPID-912073",
          "CSAFPID-912076",
          "CSAFPID-912077",
          "CSAFPID-912078",
          "CSAFPID-912079",
          "CSAFPID-912080",
          "CSAFPID-912085",
          "CSAFPID-912101",
          "CSAFPID-912102",
          "CSAFPID-912539",
          "CSAFPID-912540",
          "CSAFPID-912541",
          "CSAFPID-912542",
          "CSAFPID-912543",
          "CSAFPID-912544",
          "CSAFPID-912545",
          "CSAFPID-912546",
          "CSAFPID-912547",
          "CSAFPID-912548",
          "CSAFPID-912549",
          "CSAFPID-912550",
          "CSAFPID-912551",
          "CSAFPID-912552",
          "CSAFPID-912553",
          "CSAFPID-912554",
          "CSAFPID-912556",
          "CSAFPID-912557",
          "CSAFPID-912558",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-1503582",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-26308",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-1670429",
            "CSAFPID-1670430",
            "CSAFPID-1670431",
            "CSAFPID-1670432",
            "CSAFPID-1670433",
            "CSAFPID-1670434",
            "CSAFPID-1670435",
            "CSAFPID-1670436",
            "CSAFPID-1670437",
            "CSAFPID-1670438",
            "CSAFPID-1670439",
            "CSAFPID-1670440",
            "CSAFPID-1670441",
            "CSAFPID-1670442",
            "CSAFPID-90016",
            "CSAFPID-93781",
            "CSAFPID-204510",
            "CSAFPID-204569",
            "CSAFPID-219776",
            "CSAFPID-219826",
            "CSAFPID-220132",
            "CSAFPID-224795",
            "CSAFPID-342804",
            "CSAFPID-611387",
            "CSAFPID-611413",
            "CSAFPID-614517",
            "CSAFPID-764237",
            "CSAFPID-764240",
            "CSAFPID-764242",
            "CSAFPID-764247",
            "CSAFPID-764735",
            "CSAFPID-764739",
            "CSAFPID-764826",
            "CSAFPID-765242",
            "CSAFPID-816348",
            "CSAFPID-816773",
            "CSAFPID-816781",
            "CSAFPID-816782",
            "CSAFPID-912068",
            "CSAFPID-912073",
            "CSAFPID-912076",
            "CSAFPID-912077",
            "CSAFPID-912078",
            "CSAFPID-912079",
            "CSAFPID-912080",
            "CSAFPID-912085",
            "CSAFPID-912101",
            "CSAFPID-912102",
            "CSAFPID-912539",
            "CSAFPID-912540",
            "CSAFPID-912541",
            "CSAFPID-912542",
            "CSAFPID-912543",
            "CSAFPID-912544",
            "CSAFPID-912545",
            "CSAFPID-912546",
            "CSAFPID-912547",
            "CSAFPID-912548",
            "CSAFPID-912549",
            "CSAFPID-912550",
            "CSAFPID-912551",
            "CSAFPID-912552",
            "CSAFPID-912553",
            "CSAFPID-912554",
            "CSAFPID-912556",
            "CSAFPID-912557",
            "CSAFPID-912558",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-1503582",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600"
          ]
        }
      ],
      "title": "CVE-2024-26308"
    },
    {
      "cve": "CVE-2024-28182",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Detection of Error Condition Without Action",
          "title": "CWE-390"
        },
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1673485",
          "CSAFPID-1673393",
          "CSAFPID-1673394",
          "CSAFPID-1673389",
          "CSAFPID-1672767",
          "CSAFPID-1673391",
          "CSAFPID-1673392",
          "CSAFPID-1673415",
          "CSAFPID-1673390",
          "CSAFPID-1673413",
          "CSAFPID-1673395",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28182",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28182.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1673485",
            "CSAFPID-1673393",
            "CSAFPID-1673394",
            "CSAFPID-1673389",
            "CSAFPID-1672767",
            "CSAFPID-1673391",
            "CSAFPID-1673392",
            "CSAFPID-1673415",
            "CSAFPID-1673390",
            "CSAFPID-1673413",
            "CSAFPID-1673395",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-28182"
    },
    {
      "cve": "CVE-2024-28849",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1673414",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-28849",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1673414",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-28849"
    },
    {
      "cve": "CVE-2024-29025",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "notes": [
        {
          "category": "other",
          "text": "Allocation of Resources Without Limits or Throttling",
          "title": "CWE-770"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1635310",
          "CSAFPID-1635311",
          "CSAFPID-1635312",
          "CSAFPID-1635313",
          "CSAFPID-1635314",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635317",
          "CSAFPID-1635318",
          "CSAFPID-1635319",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1635322",
          "CSAFPID-1635323",
          "CSAFPID-1635324",
          "CSAFPID-1635325",
          "CSAFPID-1635326",
          "CSAFPID-1635327",
          "CSAFPID-1635328",
          "CSAFPID-1635329",
          "CSAFPID-1650752",
          "CSAFPID-1650751",
          "CSAFPID-1673494",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1674636",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29025",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1635310",
            "CSAFPID-1635311",
            "CSAFPID-1635312",
            "CSAFPID-1635313",
            "CSAFPID-1635314",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635317",
            "CSAFPID-1635318",
            "CSAFPID-1635319",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1635322",
            "CSAFPID-1635323",
            "CSAFPID-1635324",
            "CSAFPID-1635325",
            "CSAFPID-1635326",
            "CSAFPID-1635327",
            "CSAFPID-1635328",
            "CSAFPID-1635329",
            "CSAFPID-1650752",
            "CSAFPID-1650751",
            "CSAFPID-1673494",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1674636",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29025"
    },
    {
      "cve": "CVE-2024-29133",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1650820",
          "CSAFPID-224790",
          "CSAFPID-221118",
          "CSAFPID-1673496",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29133",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.3,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1650820",
            "CSAFPID-224790",
            "CSAFPID-221118",
            "CSAFPID-1673496",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29133"
    },
    {
      "cve": "CVE-2024-29736",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673399",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29736",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29736.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673399",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-29736"
    },
    {
      "cve": "CVE-2024-29857",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        },
        {
          "category": "other",
          "text": "Improper Input Validation",
          "title": "CWE-20"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Read",
          "title": "CWE-125"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673413",
          "CSAFPID-1673415",
          "CSAFPID-1673501",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646",
          "CSAFPID-220055",
          "CSAFPID-1503577",
          "CSAFPID-764237",
          "CSAFPID-912085",
          "CSAFPID-1503578",
          "CSAFPID-1503579",
          "CSAFPID-1503580",
          "CSAFPID-912101",
          "CSAFPID-1503581",
          "CSAFPID-1503322",
          "CSAFPID-912069",
          "CSAFPID-764240",
          "CSAFPID-912547",
          "CSAFPID-1503582",
          "CSAFPID-912549",
          "CSAFPID-1503583",
          "CSAFPID-1503584",
          "CSAFPID-1503585",
          "CSAFPID-1503586",
          "CSAFPID-1503587",
          "CSAFPID-1503588",
          "CSAFPID-1503316",
          "CSAFPID-1503317",
          "CSAFPID-764242",
          "CSAFPID-1503589",
          "CSAFPID-1503590",
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1503591",
          "CSAFPID-816789",
          "CSAFPID-816790",
          "CSAFPID-1503592",
          "CSAFPID-1503593",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-342804",
          "CSAFPID-1503596",
          "CSAFPID-1503597",
          "CSAFPID-1503598",
          "CSAFPID-816792",
          "CSAFPID-764247",
          "CSAFPID-912556",
          "CSAFPID-764735",
          "CSAFPID-816793",
          "CSAFPID-1503599",
          "CSAFPID-1503600",
          "CSAFPID-342793",
          "CSAFPID-816350",
          "CSAFPID-1261",
          "CSAFPID-342803",
          "CSAFPID-816354",
          "CSAFPID-204563",
          "CSAFPID-764738",
          "CSAFPID-816355",
          "CSAFPID-1503601",
          "CSAFPID-1503602",
          "CSAFPID-240600",
          "CSAFPID-204510",
          "CSAFPID-204569"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-29857",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29857.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673413",
            "CSAFPID-1673415",
            "CSAFPID-1673501",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646",
            "CSAFPID-220055",
            "CSAFPID-1503577",
            "CSAFPID-764237",
            "CSAFPID-912085",
            "CSAFPID-1503578",
            "CSAFPID-1503579",
            "CSAFPID-1503580",
            "CSAFPID-912101",
            "CSAFPID-1503581",
            "CSAFPID-1503322",
            "CSAFPID-912069",
            "CSAFPID-764240",
            "CSAFPID-912547",
            "CSAFPID-1503582",
            "CSAFPID-912549",
            "CSAFPID-1503583",
            "CSAFPID-1503584",
            "CSAFPID-1503585",
            "CSAFPID-1503586",
            "CSAFPID-1503587",
            "CSAFPID-1503588",
            "CSAFPID-1503316",
            "CSAFPID-1503317",
            "CSAFPID-764242",
            "CSAFPID-1503589",
            "CSAFPID-1503590",
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1503591",
            "CSAFPID-816789",
            "CSAFPID-816790",
            "CSAFPID-1503592",
            "CSAFPID-1503593",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-342804",
            "CSAFPID-1503596",
            "CSAFPID-1503597",
            "CSAFPID-1503598",
            "CSAFPID-816792",
            "CSAFPID-764247",
            "CSAFPID-912556",
            "CSAFPID-764735",
            "CSAFPID-816793",
            "CSAFPID-1503599",
            "CSAFPID-1503600",
            "CSAFPID-342793",
            "CSAFPID-816350",
            "CSAFPID-1261",
            "CSAFPID-342803",
            "CSAFPID-816354",
            "CSAFPID-204563",
            "CSAFPID-764738",
            "CSAFPID-816355",
            "CSAFPID-1503601",
            "CSAFPID-1503602",
            "CSAFPID-240600",
            "CSAFPID-204510",
            "CSAFPID-204569"
          ]
        }
      ],
      "title": "CVE-2024-29857"
    },
    {
      "cve": "CVE-2024-30251",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
          "title": "CWE-835"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912079",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-30251",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-30251.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912079",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-30251"
    },
    {
      "cve": "CVE-2024-31080",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "other",
          "text": "Buffer Over-read",
          "title": "CWE-126"
        },
        {
          "category": "other",
          "text": "Heap-based Buffer Overflow",
          "title": "CWE-122"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31080",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31080.json"
        }
      ],
      "title": "CVE-2024-31080"
    },
    {
      "cve": "CVE-2024-31744",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673392",
          "CSAFPID-1673393",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-31744",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-31744.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673392",
            "CSAFPID-1673393",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-31744"
    },
    {
      "cve": "CVE-2024-32760",
      "cwe": {
        "id": "CWE-404",
        "name": "Improper Resource Shutdown or Release"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Resource Shutdown or Release",
          "title": "CWE-404"
        },
        {
          "category": "other",
          "text": "Out-of-bounds Write",
          "title": "CWE-787"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-220132",
          "CSAFPID-912079",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-32760",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-32760.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-220132",
            "CSAFPID-912079",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-32760"
    },
    {
      "cve": "CVE-2024-33602",
      "cwe": {
        "id": "CWE-466",
        "name": "Return of Pointer Value Outside of Expected Range"
      },
      "notes": [
        {
          "category": "other",
          "text": "Return of Pointer Value Outside of Expected Range",
          "title": "CWE-466"
        },
        {
          "category": "other",
          "text": "Improper Check or Handling of Exceptional Conditions",
          "title": "CWE-703"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673396",
          "CSAFPID-1503594",
          "CSAFPID-1503595",
          "CSAFPID-1672762",
          "CSAFPID-1673395",
          "CSAFPID-1672764",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673494",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-33602",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673396",
            "CSAFPID-1503594",
            "CSAFPID-1503595",
            "CSAFPID-1672762",
            "CSAFPID-1673395",
            "CSAFPID-1672764",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673494",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-33602"
    },
    {
      "cve": "CVE-2024-34750",
      "cwe": {
        "id": "CWE-755",
        "name": "Improper Handling of Exceptional Conditions"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Exceptional Conditions",
          "title": "CWE-755"
        },
        {
          "category": "other",
          "text": "Uncontrolled Resource Consumption",
          "title": "CWE-400"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673481",
          "CSAFPID-1503596",
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-34750",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673481",
            "CSAFPID-1503596",
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-34750"
    },
    {
      "cve": "CVE-2024-37371",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Handling of Length Parameter Inconsistency",
          "title": "CWE-130"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-912549",
          "CSAFPID-1673413",
          "CSAFPID-1673414",
          "CSAFPID-1673396",
          "CSAFPID-1503590",
          "CSAFPID-1673393",
          "CSAFPID-1673395",
          "CSAFPID-1673399",
          "CSAFPID-1672767",
          "CSAFPID-1503585",
          "CSAFPID-1673392",
          "CSAFPID-1503589",
          "CSAFPID-1673415",
          "CSAFPID-1673389",
          "CSAFPID-1673390",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37371",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-912549",
            "CSAFPID-1673413",
            "CSAFPID-1673414",
            "CSAFPID-1673396",
            "CSAFPID-1503590",
            "CSAFPID-1673393",
            "CSAFPID-1673395",
            "CSAFPID-1673399",
            "CSAFPID-1672767",
            "CSAFPID-1503585",
            "CSAFPID-1673392",
            "CSAFPID-1503589",
            "CSAFPID-1673415",
            "CSAFPID-1673389",
            "CSAFPID-1673390",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-37371"
    },
    {
      "cve": "CVE-2024-37891",
      "cwe": {
        "id": "CWE-669",
        "name": "Incorrect Resource Transfer Between Spheres"
      },
      "notes": [
        {
          "category": "other",
          "text": "Incorrect Resource Transfer Between Spheres",
          "title": "CWE-669"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-37891",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-37891"
    },
    {
      "cve": "CVE-2024-38816",
      "cwe": {
        "id": "CWE-22",
        "name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673420",
          "CSAFPID-1673421",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-38816",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673420",
            "CSAFPID-1673421",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-38816"
    },
    {
      "cve": "CVE-2024-39689",
      "cwe": {
        "id": "CWE-345",
        "name": "Insufficient Verification of Data Authenticity"
      },
      "notes": [
        {
          "category": "other",
          "text": "Insufficient Verification of Data Authenticity",
          "title": "CWE-345"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673396",
          "CSAFPID-1673392",
          "CSAFPID-1673393"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-39689",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-39689.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673396",
            "CSAFPID-1673392",
            "CSAFPID-1673393"
          ]
        }
      ],
      "title": "CVE-2024-39689"
    },
    {
      "cve": "CVE-2024-40898",
      "cwe": {
        "id": "CWE-918",
        "name": "Server-Side Request Forgery (SSRF)"
      },
      "notes": [
        {
          "category": "other",
          "text": "Server-Side Request Forgery (SSRF)",
          "title": "CWE-918"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673516",
          "CSAFPID-1673411",
          "CSAFPID-1673412",
          "CSAFPID-1650731",
          "CSAFPID-1673382",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-40898",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40898.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673516",
            "CSAFPID-1673411",
            "CSAFPID-1673412",
            "CSAFPID-1650731",
            "CSAFPID-1673382",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-40898"
    },
    {
      "cve": "CVE-2024-41817",
      "cwe": {
        "id": "CWE-427",
        "name": "Uncontrolled Search Path Element"
      },
      "notes": [
        {
          "category": "other",
          "text": "Uncontrolled Search Path Element",
          "title": "CWE-427"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1650731",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1674625"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-41817",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1650731",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1674625"
          ]
        }
      ],
      "title": "CVE-2024-41817"
    },
    {
      "cve": "CVE-2024-43044",
      "cwe": {
        "id": "CWE-200",
        "name": "Exposure of Sensitive Information to an Unauthorized Actor"
      },
      "notes": [
        {
          "category": "other",
          "text": "Exposure of Sensitive Information to an Unauthorized Actor",
          "title": "CWE-200"
        },
        {
          "category": "other",
          "text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
          "title": "CWE-22"
        },
        {
          "category": "other",
          "text": "Improper Check for Unusual or Exceptional Conditions",
          "title": "CWE-754"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673395",
          "CSAFPID-1673411",
          "CSAFPID-1673412",
          "CSAFPID-1673413",
          "CSAFPID-1673396",
          "CSAFPID-1673392",
          "CSAFPID-1673494",
          "CSAFPID-1673393",
          "CSAFPID-1673415",
          "CSAFPID-1673416",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-43044",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43044.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.0,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673395",
            "CSAFPID-1673411",
            "CSAFPID-1673412",
            "CSAFPID-1673413",
            "CSAFPID-1673396",
            "CSAFPID-1673392",
            "CSAFPID-1673494",
            "CSAFPID-1673393",
            "CSAFPID-1673415",
            "CSAFPID-1673416",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-43044"
    },
    {
      "cve": "CVE-2024-45492",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "other",
          "text": "Integer Overflow or Wraparound",
          "title": "CWE-190"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-1673382",
          "CSAFPID-1673399",
          "CSAFPID-1650731",
          "CSAFPID-1673517",
          "CSAFPID-1673396",
          "CSAFPID-1674617",
          "CSAFPID-1674618",
          "CSAFPID-1674619",
          "CSAFPID-1674620",
          "CSAFPID-1674621",
          "CSAFPID-1674622",
          "CSAFPID-1674623",
          "CSAFPID-1674624",
          "CSAFPID-1674625",
          "CSAFPID-1674626",
          "CSAFPID-1674627",
          "CSAFPID-1674628",
          "CSAFPID-1635305",
          "CSAFPID-1635306",
          "CSAFPID-1635307",
          "CSAFPID-1635308",
          "CSAFPID-1635309",
          "CSAFPID-1670434",
          "CSAFPID-1674629",
          "CSAFPID-1635315",
          "CSAFPID-1635316",
          "CSAFPID-1635318",
          "CSAFPID-1674630",
          "CSAFPID-1674631",
          "CSAFPID-1674632",
          "CSAFPID-1674633",
          "CSAFPID-1674634",
          "CSAFPID-1674635",
          "CSAFPID-1635323",
          "CSAFPID-1674636",
          "CSAFPID-1635324",
          "CSAFPID-1674637",
          "CSAFPID-1674638",
          "CSAFPID-1674639",
          "CSAFPID-1674640",
          "CSAFPID-1674641",
          "CSAFPID-1674642",
          "CSAFPID-1635320",
          "CSAFPID-1635321",
          "CSAFPID-1674643",
          "CSAFPID-1674644",
          "CSAFPID-1674645",
          "CSAFPID-1674646"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "CVE-2024-45492",
          "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-1673382",
            "CSAFPID-1673399",
            "CSAFPID-1650731",
            "CSAFPID-1673517",
            "CSAFPID-1673396",
            "CSAFPID-1674617",
            "CSAFPID-1674618",
            "CSAFPID-1674619",
            "CSAFPID-1674620",
            "CSAFPID-1674621",
            "CSAFPID-1674622",
            "CSAFPID-1674623",
            "CSAFPID-1674624",
            "CSAFPID-1674625",
            "CSAFPID-1674626",
            "CSAFPID-1674627",
            "CSAFPID-1674628",
            "CSAFPID-1635305",
            "CSAFPID-1635306",
            "CSAFPID-1635307",
            "CSAFPID-1635308",
            "CSAFPID-1635309",
            "CSAFPID-1670434",
            "CSAFPID-1674629",
            "CSAFPID-1635315",
            "CSAFPID-1635316",
            "CSAFPID-1635318",
            "CSAFPID-1674630",
            "CSAFPID-1674631",
            "CSAFPID-1674632",
            "CSAFPID-1674633",
            "CSAFPID-1674634",
            "CSAFPID-1674635",
            "CSAFPID-1635323",
            "CSAFPID-1674636",
            "CSAFPID-1635324",
            "CSAFPID-1674637",
            "CSAFPID-1674638",
            "CSAFPID-1674639",
            "CSAFPID-1674640",
            "CSAFPID-1674641",
            "CSAFPID-1674642",
            "CSAFPID-1635320",
            "CSAFPID-1635321",
            "CSAFPID-1674643",
            "CSAFPID-1674644",
            "CSAFPID-1674645",
            "CSAFPID-1674646"
          ]
        }
      ],
      "title": "CVE-2024-45492"
    }
  ]
}
  Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
 - Confirmed: The vulnerability is confirmed from an analyst perspective.
 - Published Proof of Concept: A public proof of concept is available for this vulnerability.
 - Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
 - Patched: This vulnerability was successfully patched by the user reporting the sighting.
 - Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
 - Not confirmed: The user expresses doubt about the veracity of the vulnerability.
 - Not patched: This vulnerability was not successfully patched by the user reporting the sighting.